Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 15:43
Static task
static1
Behavioral task
behavioral1
Sample
6f04c76848259f38d14a48dd78143857_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6f04c76848259f38d14a48dd78143857_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6f04c76848259f38d14a48dd78143857_JaffaCakes118.html
-
Size
27KB
-
MD5
6f04c76848259f38d14a48dd78143857
-
SHA1
ad6d646e10a0a881a82f67419cab9c3eecbeb190
-
SHA256
67efe1d775ce3ce444bd66eeb21f95d843c8a35c7f631ae6ad890b08ef2cd5e5
-
SHA512
652e58a337926f5e3f44f78aaab45faf75b31c4dd6a2963e7928a4a8919277b1d85277f4f46f6816556ee6e11a5213eb26a2361d14d899a75dc56a5b1e52d104
-
SSDEEP
768:r/164gVSpr0sB+3/Asupgp+w6EEx/kz7rA90rcmYj4h+w:r/165SpnB+3GgHEx/kz7rA90rcmYj4hT
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000052c4c3071534d2b7019cf4d5ce4339129644641a0006b3642188089f501fa317000000000e8000000002000020000000ff16bea9cabd6ba4420c9cae91291c88665f60210d40c5d9b2a1d26567c1074d20000000aa593385c1371995f46d6d9711c2b45f2786cd5b6698aff1e454a2dc5c68bf8b400000008d5efdcc7dbecfeb412dfa9fd6ad2a293e88921fbd326075672178defd228f3feb781e1a0c8315f43d7cce691e2db3ef0456f67fa9e5fc7cb33c234a48eb53f1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 001b5929f1adda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000003c82e7e0faf90ea5153e46ad6c8fee9c14a829b1caa93ab6924ce394a600d267000000000e80000000020000200000001b29197d835568e4d430dc1589a07099052e55b23f38d8e40ac86399896d59c590000000da799c4fb6c9d47be4dfa5f0949815dfc8063261ede368e07afe3c2f6b8d7da42f3581218dcb01e31586da8826dba7a126086f7fbfb52966e12a8aae1472f66bfb2bb15e806823ebe7889c31ecb414ab33cf9ca131d89f966f282cc6fa12941a35c9fe3fe4d5af4b3d8f06959e2b54b037d5ca86c843c2648b0d20c85ec456d8576570a6417ff27c427bd4ac1700d48b4000000091089076e0d8e322ef897f5c2a5bf6169e50c54390ec45fa3d0a6b8a7df5bb038d01283cd718113b78c0f7d3acedf96c72ee171cb29ae34c4dfff5ddbe27a5be iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{52248651-19E4-11EF-A585-5A451966104F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422727256" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1964 iexplore.exe 1964 iexplore.exe 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2572 1964 iexplore.exe 28 PID 1964 wrote to memory of 2572 1964 iexplore.exe 28 PID 1964 wrote to memory of 2572 1964 iexplore.exe 28 PID 1964 wrote to memory of 2572 1964 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6f04c76848259f38d14a48dd78143857_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532aaa2f3fd925878318a9358e1d41a83
SHA1982178472a300fca2d299aa81a91c3a19045394f
SHA256ece9149654e97161d6acc0c0a4e8625704e0869675ded3636123da734776bea0
SHA512daea8a44a9bdc163170e46fe9f1d15639c5db255c6060e1208bac158265f953b4faf2faeaf6718de7d8fcd6b109b10a3450a93431f797b2a4855196a2dd2c9ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56182bfae641327e5f488a3ec368df116
SHA1b3b4ad2bcf6d5647b90db6d68acc1185e2f5f086
SHA2566bc97614e82006f14fe56d64fb7e9469a9bc3c33701e9834bd67ea553288405c
SHA5127b4ccb97e8984013dc16d8faec0b33807ac6a522fd1e752383177d3ed1193156a96c11aef46b007e8dca9fca98ef7be741685036417384b51f7a4ede6830e75f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565bc8b3217f1e16d5889595dcc8bca73
SHA152eb51971330ccf5ddc1bfbe161126b232b7f8ac
SHA256fcf99e1095d4ed29938514bd271e3e7b637f732e24045b2930b42fb89d563906
SHA5126972e4782599d4e343c802cf7fb4fd38df512b5f2861a4384a9a32458f43f6e96e3dff5744bb821b1dc92c8e5632acd5702b45194751c8b9eb2ee7e5e58bdca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ec64eb55b7c3d5e70214c79103e72e3
SHA198da7e54ddc684b2c357568715a97c504504337a
SHA256df548c3f5b7de59dc62683b6b62cbd8de86e504665dd8c34f0e1f7d00bb4a528
SHA51208b9c8d176c60382aa708ab7ff0d3212a322b4fe94b62adaf6af600226ddd0deac1c5f853ba55c43bba257f994fe87bf00ea4b45ae06bd6c9a00a0f062ee08b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5cf07cd6f2e361438849a0d20693b78
SHA19029a816431e7e6391e03ea44f0357a836d68e41
SHA2567d37fcd95297880fa33df452545c29e835f82bc458f0115a4633eea8d1537c15
SHA5128b76dfa458a9ec7d19b80595ba8b86d4420f1efdd40f7d0e7b2d7c5e11bb0de58b290ff8c65fedcac2b220306f8cde7407031c6569d8e270a069737a245886cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568ab15e1fcbe8bb0a2f29ec05ea2ba2c
SHA171c00bd6c0b602bfbcdd26cd93b3935d9f0fcad8
SHA256177a27549a019d3667b7caf4087e3c8ac797783d081b5dd31b5ebd9f95f24e17
SHA51204cd43374d6456fba1c7f6e2f780890b24bba7af729d87d57ae1e2d34d9e9eb21757af80c5ad6e010f91bf8b7b88893fafc7a102d59bd980c0a5305977bc9181
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54eb15808a87d08bc3ceff6aab7f5a844
SHA14cd4071705cd418ac61415939f4b0aa3f19265c4
SHA2568927420ab8228b08b451afe7796ddf3e5ad5d85d99ff105c4b1bfa3131d46691
SHA512d8cfdb0aa6b544a411320c1fbddec51e1c88fdbd437e4ac279be4b083e4859303f59d7c85b05908933e3318cd6b8d47f83b1e9141744f7a798422e4526f3b39b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e53ce48f216469d15a58013d36f77ec
SHA1aedf962cadedd933b40cd23e693d6f337ea24d81
SHA2565c77a8c232ee699654211da424279dd3d15d1b7afdb3384d6f8b3bbdad026c34
SHA51226b9978a8d6410e5babf78fef905a9a67ca2786a573a58c2dcdb6144768ac793117aab94c83ae97d4ebb98353bd5d2d0927c9598bf3174b638a34189cb84bd59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58210679ce574d3445b8fa76ed8b70f90
SHA12046a641946bb582ad878fee72c8d8b55fffe738
SHA256107fac1dd5b41b5ae8d6d501b194a3af38d5e7237a9825497f8c3112c8a0ffd9
SHA512ad7c4d0a8016146f52cd533e6960e891ff3360f7aa83d0dca5399ebb36e79db906589dceeea9de2c8f7f8af3954361b239a303f69b85acbd7bd5f17f9ba60f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b54aa60f1dbbf34c1ce1e536daa3280
SHA1c0947b3fac5d70a72d68938e17e6a580a43fd938
SHA25698b286de17c6db6ff4fe583e73dd6f4fc076449fd26ad6f68985248d4dc1ab94
SHA512f638fc1f94909e1bc77b2d07d79f287b3379f9af9fd65fab142396560a7ca61e5ee9a026896cac9f41684b4c9edbb1a645cd395e1a00e65f4a844b1e541ad78a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce68aea7a825bbb822db6aa00b6efcff
SHA1e77882260f33e1dd2353ea152bb9e2c5e4cfcec9
SHA2563eb1d0752776f9825c6694a2c53bf0f3611a8c2a14fdbfe8fa212fb93c3bda06
SHA512067f92315446d6e43a0364a2d70ef235adb63803e5b64434fca31b269f28a36133ba5d3d8c09b6adfbf6e45fbe48e525e62c656a8ac51b7a8a9d28d0affc3454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503798e21f5f4d4337c357325c2d4c492
SHA1da639b03d24bcf60c96154a6eedee5a01f1d51fb
SHA256b628a41f42a11ccafbe121556d925c4dd677a9845a829dc0ec53c292f5fb13a2
SHA51283d87976a93c2717d8774bbb240508fe738aea6bcf6ab555297f99ae256ae2b4adb9fd670b1017cc29528c723722ed0ae2831f943582ce85cefcccdf69d99fd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fc4522737533525a04d551f6d450c4e
SHA1ab2f21fe626da78b5e5d5b82aa301faf668fad20
SHA25694f7ec0ee8049db8b44db33e9facfaaee727010b5eee3bde4f85ba2fcf60ade3
SHA512148d0160bb7621f4a7d655fc1226f203a9f5ab9ca0338fa54e99b14bdfad7daf682f81b78ddc4bb21ce72e5b7ef34f57b04c9845948b46c010a5c64e67da1b7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ff73164c66056b8d7b616c808fbf7bc
SHA1f33be33381df454cd07ff52028ffe7ec6a292000
SHA256343b220b0fb3a7f10bb5dc8aa04bf71cb8e2780f52ccde4aa22cf3307e92c66d
SHA51241b2037c8d02eca3c1cacc47372520afaf7f61185b8d9f8fae678af8ca26cafe09903da0f6cf6accc4fd67d54161a8cd609356f7d32a9811906319598af8e5bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe83f38c4f6fe27b6daf50be8e0fbc9f
SHA12823fe02f76212970388afd997ef96abfec764de
SHA256d58756984a16d7d3fea046ad4934169cac3e607b6c8ad558e145718f1cdf569b
SHA512667eab354ec6e6429690331ce92d817fc9c8bbe8b5b895a7ba5680e0293e472d9e39ed3f4519aedb9e5626900bf7721af7ada43bc20e4d8e476a71f41c1b87a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547e2dd49bdddaf60b03014893386127c
SHA1b680288cd88ddc946cc3cf76b9cd1cbf23e7e786
SHA25699e08fe84896ccb2b004a5aa1f6513f22634778020ebaa2c7a7af571579b4572
SHA512b1432f0510564bc246e3c90df8cf7cf75f408a385f06997505ea32b6c9402a63759b1213467777a55f8efcd5a0faeebcc4d487bb5719732e8819c6ae9f720392
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576ce48b736be5e56484fd68302f57736
SHA1426aa2b02d6f7bb17de54c7a4088709c26b1af28
SHA256a3779c5ac02410b5c39b059957b6b183232a988ab713dbf1e2ec27ef26b8bf8e
SHA51278da3441e59d9272526ddfeed059e3cd89de05f623bd962c0a8f043398f42f541c41ed2eabc3791351252afc65a8e14706ffbefab3af1e6c9e39921ca25006a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581e3f8f5e0fa3f9928a62d64fe5bc8b2
SHA107d85a6985dced6bf16d4683cd6d25c957255244
SHA2568419872e68f4b8765ad046b11553424ab1df19a57b8030c7c979c492e353c622
SHA512e62e49d1ca8e10623cd3281f72a1463f2fdd7ab7d7f39026517493cdd34c7fa3887fbbb8d9f15bddd76d478cf57b718e12b2ae14240a8245a7372205c43dca9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ae03be9be9ede1393d5b268c412733d
SHA12b1cc6c18c7197068f95b4b8f0951e73e8e01922
SHA256673778aa15beb9d939e17b0ce2f95466e43eb7c03cebaff56ebb44869570b371
SHA512554f5c63cd7dd61a4703a43b04d4ecae910a4eab85cc8aa88cb7c1f5de4abdd7866a5e4fa7d0dd44488ac3de24a6f608e21736195b57707f3297f15616b25704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d15a17c80285a225ca97c3b19b71363
SHA1fb6a814fea08186fbd935ffebb703da9106fe4a6
SHA256df3041c0c90aea5d2f9013aa7c72da159d4cadda27d18b2b48f1c1dde22e64f6
SHA51207f301b4868b836cc1a2a60629d9b22f89a45157e43d5f83b89458c0bc60a8d44f968dd2cec10594449023e1dd54afb3e804e0a8d8f6836405e31b865d521dcc
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a