Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 04:12
Static task
static1
Behavioral task
behavioral1
Sample
11759ba1582c8f9a35cc021d197a6d97_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
11759ba1582c8f9a35cc021d197a6d97_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
11759ba1582c8f9a35cc021d197a6d97_JaffaCakes118.html
-
Size
16KB
-
MD5
11759ba1582c8f9a35cc021d197a6d97
-
SHA1
2c37d9894c0cb8a277157d91de869197b9951790
-
SHA256
612c1ab58f6c8935545679013a2a4bfed9b42afcc6eea60abf566d6837f8911d
-
SHA512
33ca5a42695a32bb20f92b0044eda0e6bd4e85c67931e692642e1975d3466032e0425356d9505039c90560f15055d1223982ad9e15563a07a345fc7776e53782
-
SSDEEP
384:S2ytSBT2xsqo9soYECSkn4JkHutRNlRQsGlee4ptrq9jzYrE:jhBT2x9wCSkn4JkOtRNlRQsGleeTVzYo
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000ece38d6d98d729fc079319777bfcb6a4b4729707da769d64cd8d0603d8ab15c2000000000e800000000200002000000054baf21bfe2640f65e24d68934b620a1a5baaedcd5aac8145b965b443380f9d72000000015f2d720cc6e677419b0a09795e9d4520e92e671a2de833fb54683f18ec21432400000002f3dc7deb2e3c62790e26ae775cbde91b1e5ce5dfeca73f5c0b12b0092723d311d183aa685b474dbe60bce4cdeb6274e1eac0dd34d3a5bebb964b924e29da648 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60f5516ed99dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E8A1661-09CC-11EF-922B-6E6327E9C5D7} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420957804" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2272 2400 iexplore.exe 28 PID 2400 wrote to memory of 2272 2400 iexplore.exe 28 PID 2400 wrote to memory of 2272 2400 iexplore.exe 28 PID 2400 wrote to memory of 2272 2400 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\11759ba1582c8f9a35cc021d197a6d97_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5371e81b3bf52c1496eea4d24434e9134
SHA15f4127573e95fa6aa64548551e7ce46b5f4ce1fb
SHA2565ce0d77b44367555d9504e7073780f90104fd581ac0fb91ba1be8808e9146f08
SHA5128c2008421e80ab4ec5fb22d6c98cb8460788e7b57b96633b27fd3b19ffa24684ef63067c44575f480cf6ca0347253126f388ce583485194ac1018b2f16bb133c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f43ec2e83734d6784ef859387c78b1f2
SHA147d5066e60ff6f7b8d6b474da3cc100a866d19ab
SHA256ae472bab0317bae6a6632efe873ff002ea76777dd02d73aad45d7aa5ee6bc1d4
SHA512d78bbe6eda2b423e52844e2efcf5f8e569ec23ae8ee48049db4331edc0a9b5338e750093439dcd2c9125a1786b82f28bda81dd19ed84cc0007852c0d4c9da48b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba5aabdba4c23a263515fd446b9d9359
SHA15377615083f832c29f9e300879d353e8358afd52
SHA256da7818ca0c90571bd1e08c2965a9d59b1739d83a9e36e4a97134b1e67d4b32e2
SHA512034ed0685263df9df735ebf65f67d7a604aa14a6fa8963e778a6365243b43439086109a5f890881556805693a8d57e1edcb907f474ae0ae001e7ccbb55b49c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539c4b021cd07231717e1769327356075
SHA15bfae2fda3bfc80d5dd89a37170d625a12ebf2e3
SHA256079529741226750a6ebff582d36739b1c2007e4d9721ae27ee3acf4f1941ddc8
SHA512b2a2c8348f18bc5a540426e0a3733837a883e8ef4c5bcfca2446b25a66aab644db21d6ad0a7f097cad095e64a237e94895c8c27cbf2088d467f5a27645ed2f34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba1b7317a8dfe4a4b5988f6c77bc642b
SHA1ec0a24eaf6ffa683a73547441b12b973bde62632
SHA2561e9ed3699b9d220243c8365d4f9d4eeb88d78b6267b4915df82d494cd82f8331
SHA512b1994207ab7bd7faba40156170bad98659170e296fc262bdf928d718e806a030ea8a8b672c7a04a22233fd4f5cb8dd176e1743d206c30bc9b72c684b0f14f41e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e43f2aa2fd14ec32cf7dd448cf6461f5
SHA1ab95b5f1c85b7b77e4554b37ddb06ecd5e6a5654
SHA2563b9aa584b085d7b25cc7cbc6bd95276a5cc7187e4b96bdb7f7920b2e396ef392
SHA5128207acb061b63945288409429954041729f1b40e92a786fd0d939d820fc61dfc448dff28bb9feca19ecad7c3cf92f19f367f3fff0673ba9ebda24e6917e912fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d992a24436e2696166b970ee6fb2fa52
SHA1fbd1e06dff6bb5dbdcd64557de71a79e17acb191
SHA2561f20b3969c84300dfe4bab30769b34320eb2715e4bc3fd64a5e055433aa115e0
SHA512db7f3c29b61e2616e80a02f995b68e9dc457adf505224f25c0d38f6a268c6e4b394fec6af6412c5e32a3100fd5c128b62ed0fd1abf3eff99e43828d4d906f4cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c789f7f5cd138d2685b24c897dd00a76
SHA14fe09d130f90cbd219f8b68df5c76366f2eec56a
SHA2569be5568f1af91b54feec7047abd32334d4f1b782a23c9ccd31c57474d17cf237
SHA5123002cd0a2674456885a2beb99111aa9432fd13928ac681810dab2784962b629a3cececec7d880eea6400f2e3fad0892397dae35d4d8f1f2c63f740ec852c79f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566b9c518dfa2528c5d37ad30cc31b84d
SHA160ce1c15b5133cefbb073b8730be5b8aae25dc06
SHA256e15d5881a12a890d0464f5e11bcf7954511a0b7347b903560aa89a56cc97e51c
SHA5129814dd0a0943ea8b8dbabf3f9e78adb03f2d8e0462d53db5fca7625ec15764579b218c19362b7703ae9b73697f056d39d92a8fa92e0b6b3029d629a77ed2814e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599025a70819ad36b14ba66ef94c49989
SHA1e804cbc3f514d8fa1023ad24b56fa361ad49e80c
SHA25656f02307e183fdd91fbc0a0cfdedfb4ab34ceb0265985056284cdeef1c4fb5b2
SHA512f594fefdc31e1c4dbe1fbefbe2cd67930bd9a7fa465b073ab50e28126b071860f2d9f0206aa5a58210f6e1edc919f1df1d15b30cf230caf1bde9bb72e00aa78a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f089f1d3b3a24616624f2fdc44587504
SHA1716fe9e80034a44b36577a333cf43f88d1a2cc68
SHA2567bc4cdb9906f26bb7fc451202a4390628eca4f2c4313e8a04c819fe5a65b4300
SHA512c37f3a27a218351eb8a5239a3e8ed3f1d93123d1a6bda5cfe13c91c7ced780ad0013d826176cc5515b2f5ecb719587e63d4e271b2e67749e0cce9a8aaa90f450
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517a9b21f47aa87b5a0e4d6b229a5839f
SHA13d0a7c9a6f59cea31da878b5bd6ff8112630672f
SHA2567b7b2b87654a2c922f4426f693b9712d190c4987caa4ac6fb4344960e0383ac3
SHA512bca011e81c71264c118f3ad5c379e253c71a254bc3b6163e25b4429c4c5d68cf42c538a9500f44e43c6fa9e04348ee3ba2f39534aba757335a60e6e26460d632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ff1fb35eff3623e7cac7f1b1c54bca9
SHA1b582e0f1b54106992424b4a4b77015356dcc7e84
SHA25664c563bcb66993d3113f6a746e172e8bd8feac2b551feec95723452cd8eb809d
SHA5125d04dca6b56c91cf8195cf2bcacfb4fb4fe2b3317f374f72965d532a8e613f39ef777e365112157913e807e73d8e99777f982ef0d2ea6084367fa889bab5934c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b51f5f01720be2bf9f64ae28b8fcce62
SHA1978cb5a524e550c5d5d6a083a5f9bbe828de639f
SHA2566af2c06778e500f5b8aea2b18839149720eedd4d1b1742c2b2e154ddb8de7dc9
SHA512027a60f7f94e84767c882d67b4c8b9b4c8bba048b3832113d7841ec7b9ef617bf5d875a7d5f2603e0c37f7f9610800da1dc1143379816d1f038b735d6c9ae879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596253a940908ca839f544d014d45068b
SHA1e22ceb6556df7011824156b57794c51a74cb3bf9
SHA256f9a6ab1f26a6990ee1d739bc5ecbbf6ef80e71aa35af6a18875253470adefcae
SHA512549ebe008264e7dbbb5afaafedd0329a1ecea5493b1a7be9bc8c20f7d844f69e3773933ce389eff52a7b469470a3b4195720dc87974ce128d7f700a6bca1f204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f839d890ce7ed6b50a31ee5a14c1b81
SHA1333ba019ddf902281928edeb319fbaf7869b5181
SHA256358ce927f027588ca0e171f26b44ee23466f69dcd7be88959012a2c4fde75196
SHA51280472ab4a73342a89418f7551f8c8ca21bdce6f939dec669b49555fab20e4ac63eb34a08a853907668039a7f0d7dac2af1dcb7929ec159c93ed13ff9df1c017c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523ebcffc27db78262cc88a1be2a816dc
SHA174e8826b47043716917ecc02ef81d9d0eb7cda34
SHA25614f2ea90664a565aa502eac028c8b47c385a38cbaf5919d2bb5635ac001c62c7
SHA512834b88a348a4e0cccc91bd2de5ab6dc6f921df3699fe459be6238b055ce37da0680ddae8763524f9386beac6dffd69dd8c33759979aa738f7c326a32031d7eaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f32493b60faa43363d445ca6df48fe97
SHA19d204e6bfd38ecdc5b6d31fe0a17f4242adfe20c
SHA25680ae0ec875686620f97a44e741ddbcde52b313e63094f20bebeb944816dc95b8
SHA5128393c522e8dbfadec105535e76b49c8f14a5e8042767acb3f6b0d1981290038e452cb3c512c2a7a5fdf35dd0085a30aeffe5a57b8e82d4150b8c03d629c35c62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cbd4e871a75bded82f5b7ed60a90c08f
SHA174838c0c8cbee46b7f9ac46493ae01e90590d667
SHA2562a662fb0bed6b64575a1c25e37166614485aa3e49b1dbd7c030936f1302efc89
SHA512c090504132863c679017b2c96b2419b1f17a6530ec7044d43f3b71ed36241851b9ee0568616d023a1e05a62461957a0e147fb43b39a1b84b1568290d385fc20f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569a491e4c9758d7765d538308f3f9108
SHA1e346addb7b39d3c03e306a9c5eab46e965d867cb
SHA2569a3c5107daf0ed71a69eb08f92f26ea6001105167776ddc5c63bc2e798266dd2
SHA5122f788acf195f725a0dfc886859bf90c6c1235fe9d1d1716121b333dd3e016039c2790bad16eccf55b99a1653df5631bb97a185bc3dfa1592ca6fdd647f4cff4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fa57ee0ff24e53a4d3f8a16e13d16ac
SHA1e14af113a98004e28329d3ffb1f2bf61114ac09f
SHA2563558933398d88c841e67cb45990711158088845c71c75bc89f4cfc909c1892c8
SHA5121de6e4a6a013e9043270e99380764924d35cb1f6629deb1114abb5378c5f49f8cf70bc7899301b998fff268cbbdfbc8533265ef1689497281f4d333a5ffacfa4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a