Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2024, 12:21
Static task
static1
Behavioral task
behavioral1
Sample
e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe
-
Size
786KB
-
MD5
e772e150a753d87b3d3c7b8d22edd3c9
-
SHA1
71f8304e6ebeb45d02886bc2e4dd9042258d0666
-
SHA256
c180dd5d4165f5601c0302d203acb1ad6b729759d7fc07a52a29d483e5f919ba
-
SHA512
352611cd1fd42641f4894a100a5748035bbdbc1614007f3731662ec965af7757c76ac4f07af4d83a9c4a5258dc01ed94fa02de32730965830820753916491c22
-
SSDEEP
24576:53ZEqn4on6JnmHFBiogPHobg0Dy6qlL5M5uZZMq:nnnn6JkrgPYgdM5+Sq
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 3996 e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe 3996 e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe 3996 e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe 3996 e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe -
Drops file in Program Files directory 30 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Flasha\Favorite\1 e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File created C:\Program Files (x86)\soft042902\s_0402.exe e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File created C:\Program Files (x86)\Flasha\dailytips.ini e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File created C:\Program Files (x86)\Flasha\Favorite\ÀÏÆŲ»ÔÚ¼ÒÍæµÄÓÎÏ·.url e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File created C:\Program Files (x86)\Flasha\Favorite\1\2144СÓÎÏ·£¬³¬¼¶ºÃÍæ.url e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File created C:\Program Files (x86)\Flasha\Favorite\С˵ÔĶÁÍø.url e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File created C:\Program Files (x86)\soft042902\setup_0402.exe e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\soft042902\w_0402.exe e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File created C:\Program Files (x86)\Flasha\Flasha.ini e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File created C:\Program Files (x86)\Flasha\Favorite\1\ÒìÐÔ½»ÓÑÍø.url e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Flasha\Favorite e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File created C:\Program Files (x86)\soft042902\02201102030202162902040202.txt e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File created C:\Program Files (x86)\Flasha\Flasha.exe e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File created C:\Program Files (x86)\Flasha\Favorite\ÒìÐÔ½»ÓÑÍø.url e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File created C:\Program Files (x86)\Flasha\Favorite\1\¡ïÌÔ±¦Íø£¬ÌÔÎÒϲ»¶¡ï.url e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File created C:\Program Files (x86)\Flasha\Favorite\1\6566ÍøÖ·´óÈ«.url e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File created C:\Program Files (x86)\Flasha\Favorite\1\ÀÏÆŲ»ÔÚ¼ÒÍæµÄÓÎÏ·.url e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File created C:\Program Files (x86)\Flasha\Favorite\1\»Æ¹ÏµçÓ°Íø£¬¸ßÇåµçÓ°.url e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File created C:\Program Files (x86)\soft042902\a e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Flasha\oem.ini e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File created C:\Program Files (x86)\Flasha\Favorite\1\С˵ÔĶÁÍø.url e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File created C:\Program Files (x86)\soft042902\w_0402.exe e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File created C:\Program Files (x86)\Flasha\Favorite\2144СÓÎÏ·£¬³¬¼¶ºÃÍæ.url e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File created C:\Program Files (x86)\Flasha\Favorite\6566ÍøÖ·´óÈ«.url e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File created C:\Program Files (x86)\Flasha\Favorite\¡ïÌÔ±¦Íø£¬ÌÔÎÒϲ»¶¡ï.url e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\soft042902\setup_0402.exe e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\soft042902\s_0402.exe e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File created C:\Program Files (x86)\Flasha\oem.ini e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File created C:\Program Files (x86)\Flasha\Favorite\»Æ¹ÏµçÓ°Íø£¬¸ßÇåµçÓ°.url e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Flasha\Flasha.ini e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60cf224daf89da01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1287099838" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70141e4daf89da01 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31099311" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{784E0A94-F5A2-11EE-AE4D-D28C415B03FA} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31099311" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1288818584" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31099311" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1287099838" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1288818584" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31099311" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000805151ee19e06f4a9c31cfe2ca71daec0000000002000000000010660000000100002000000055de3a794fdbece5ddb99c2f9eaab9b3c4ffe62d8fe699d4c6e58a200cc447a2000000000e8000000002000020000000c2915765c89d419085683381dc4ee53255c4ca9dc3cb46ca34ea89dc657666a2200000009cbef92a71d1846ab8feb428687da8c37adc553758472185130e48e1a3bf166e40000000ab6a8cd98f468d60ed90ba74aff8219dccf906859fd9171d45d8b7de4b19c5d75aa256cafc02fe5ad4ad4468b5ee5bf03e1ba4f29e9e4a422e27b96fd6d3a1fe IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000805151ee19e06f4a9c31cfe2ca71daec000000000200000000001066000000010000200000006ec51a4208979994cd6e9c7d188363beb1579ea77148823f9cd11501abf6c3c9000000000e8000000002000020000000c4d4355460c4dfe894080b0df52fd099ce3d6614218a1b7ceb2c80c46979238b200000008c5ea3293ac73cb4f09534ed94003132396ae182fcb66b9084e4350a2f558ced4000000071a653be937cea61c742339a8b4c7452b022ed6ac9668a507bacaae9b4be35b2da8364b75cd1d2bba0b54100e0caad651d6e24763fdc1cdc0c977a7e30a9a936 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419343839" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4136 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4136 IEXPLORE.EXE 4136 IEXPLORE.EXE 1832 IEXPLORE.EXE 1832 IEXPLORE.EXE 1832 IEXPLORE.EXE 1832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3996 wrote to memory of 1012 3996 e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe 85 PID 3996 wrote to memory of 1012 3996 e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe 85 PID 3996 wrote to memory of 1012 3996 e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe 85 PID 1012 wrote to memory of 4136 1012 IEXPLORE.EXE 86 PID 1012 wrote to memory of 4136 1012 IEXPLORE.EXE 86 PID 4136 wrote to memory of 1832 4136 IEXPLORE.EXE 88 PID 4136 wrote to memory of 1832 4136 IEXPLORE.EXE 88 PID 4136 wrote to memory of 1832 4136 IEXPLORE.EXE 88 PID 3996 wrote to memory of 3848 3996 e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe 89 PID 3996 wrote to memory of 3848 3996 e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe 89 PID 3996 wrote to memory of 3848 3996 e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e772e150a753d87b3d3c7b8d22edd3c9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" http://www.yftk.cc/2⤵
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.yftk.cc/3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4136 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1832
-
-
-
-
C:\Windows\SysWOW64\Wscript.exe"C:\Windows\system32\Wscript" "C:\Program Files (x86)\soft042902\b_0402.vbe"2⤵PID:3848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5548f8a2766a9c75c9c43c5d583e80d34
SHA10259de3e8fe1e5d99bae06aa65253d1e7cc1419f
SHA256a4eee83f86d97bfe06b96c9fea3228f392bd5d1c1ea05499bfa26956dc039dcc
SHA5124324f721690ccc8ef62f2ac27a45717c0892f7747695e4800300c497c04b60dae0e3194c4ea5fafdfeb72f94665f31d97e3bf5f6c142f32d14bf3207eaa5e26d
-
Filesize
1KB
MD54df71266b02c331550fabb2df9fc4306
SHA18f97b2be84892047c9320a84f943b5e27d843e6a
SHA2566ecc81e75f7bc9f5c9824ce582899e59820b67b596384a771f87527c6837a8da
SHA512a5d54e0e68cb8740fe452e71f4f8d0c641a54997a9517aae1a05f7297305f654297fc480b95d27b68db63ffccaf424e7b3439b22b9e4f93665d4a58c2b1ee8a3
-
Filesize
2B
MD5625befee7ca7b72872b5167a627918f1
SHA133fb68b83b0277a85e63c2eb1684c2f725046b8e
SHA2566a9997023a65253995105d37bf8f950a39d5e75667f1b8e0a65bf12f2ddf06c2
SHA5123993798f0742816df50822adeada931ceee18fdb7a98e1b3c97239868dffbd73e02db14dcc474a7e69d5bad9b43019587b0035ae835a1f10b007015cdbdcdbcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD539dd625b01652b616f218d3ddd2cf208
SHA1d743d761bbfcb8cfc9b197bf3e903154f0255113
SHA256885889906cf0a34f41de313074d706b129d988dc1d8b944dbdcf4e1d4e460b77
SHA512b9f61ef3bbf3f7324ac0852c1c49a7a1c576b9168238eb16a15023916cbf1370d49787e8d05e58dbcc6ee8b23427f12a50d203de0ab3226eb6e1a80ee9637f80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5aa016c69b1912c0f1cbe9696a3f91870
SHA1346e1a95ff0a82fec3d7d2e09077522c7abda89d
SHA256b30226753084cfb354ddd5535b060be9e5cb26146cc69d9ec5eebb400c9462c0
SHA512a8e4584793e3aa82e9bccc9268679ceccd1a345d4cb0da670b15a638c80e91dd4f825806ebe02e0c1ba1e426f3b556bb9c4be0c44bcd12771aad63bfe8263f22
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
14KB
MD5254f13dfd61c5b7d2119eb2550491e1d
SHA15083f6804ee3475f3698ab9e68611b0128e22fd6
SHA256fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28
SHA512fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7