Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 20:17
Static task
static1
Behavioral task
behavioral1
Sample
9bce05ca87e2824bd86eafb45674e2fe_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
9bce05ca87e2824bd86eafb45674e2fe_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9bce05ca87e2824bd86eafb45674e2fe_JaffaCakes118.html
-
Size
4KB
-
MD5
9bce05ca87e2824bd86eafb45674e2fe
-
SHA1
00f1e9f2d97306cabfab1b37649c15284f99f8bb
-
SHA256
17a16a5da94630fb6f6001ab3d0b29f986358a71a23036b928b2bf743f35c3a4
-
SHA512
20e6914b883de967d542b3d7c05735bb8d5f74f7a7f34c84fa8e16d92e72a3d1de29445c72fca36df5dc1f536264b8fbeb2e3dfdd16a668db9789845b558707b
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8orKX9d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDP
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424212549" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 606fbd5d73bbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002a974a0db1fc0d4abafc0ab364af10d50000000002000000000010660000000100002000000007c382edd98b0efe4f60a1e18abbddcf3c67029befcf6ebfa0dc016151357f7e000000000e8000000002000020000000723b74a1553f8ede16270835cf7b35e5b4e4fba40cdfe4459997cbb659a36f1020000000fc4420a3d18fd23806aba20b6e07d06c58f96120958c37bc833a8bde762d5be240000000a129d9075f28576f3a959f4ac592dcb4326a0a54326209ff4b58c29cc1fb598531a3d064fea223d1193e191300fa1a5268bec76b628337a8424614e2c43ef690 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{893184B1-2766-11EF-B20D-42D1C15895C4} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2984 2220 iexplore.exe 28 PID 2220 wrote to memory of 2984 2220 iexplore.exe 28 PID 2220 wrote to memory of 2984 2220 iexplore.exe 28 PID 2220 wrote to memory of 2984 2220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9bce05ca87e2824bd86eafb45674e2fe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9e957abbfd555130117bb2887a2f322
SHA16b385ed497fb80135078fe7e71bc0ceb9a8dbbb2
SHA256d3c4e44c094d0c8f69468f5ea7d957c1e2364b43ae549dbc2d0f44197391e05c
SHA512493fb3908437eb4b8dc91481c063ee2a56b68bf7cf35e0e0ad0a6532f6a39b255806155e820412dc020f613721bf7d062997d0e141459ee3592867c4d95ca0e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a61b9619269daeb7fd228c64f339405f
SHA183742a86f22baf012b004b9b4b4e32d58a952f77
SHA256369302d669b64ff1bad246ee0ce09ddc9e251595834dc29b3aef915d31649c30
SHA5127fee617116e48ddbe2ce095d141978c8b99ba9eedce4384a48eb3f5468cee64875e30ed4c633b8c53646c6ba9ed72bc3ebafcf0447838fdcf545b9aec031e313
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f64426b2b0f3d747c899afdf09e769d3
SHA1f0ab23e5fa71fac03244d72ac40a9b954ab3de00
SHA256745d0f73558737987b4551e4bdde7e0508cbcb88bace7e3ae91e733e9441d8fe
SHA51277e22a08f88ef4def43f352551ab52b5eed13ff606b139c4b1b31e254879591db805307abaa78a4f8b29907499ea358f656784ce49d8a6beda72b1d88d6c3352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b7a38b541c3fc26febc8e5854bb9cf5
SHA197ea7992880673ab3cb024d07211a11703ab0a3a
SHA256be1f9c87837c1024e76d04a8b5e9f5e2ed2c5144edfa89dc7e2e9e67f960da63
SHA51285ec63c839b68537dd1bdf1ef357105a45d132121e582bb22377968039d0646a64c118e4ec01362fbd26dfc236a1b1e06f8c16cea56bb80faf6c3e523a89dcc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0548800e0167dc710b0711de555052f
SHA178c2ea3d91d37eef488a3e3667c4ddf2399b42e6
SHA256436ced6ced9e5fa758e0d74afec9998887f83098aee3cad56dc1c988ad267f75
SHA512e9120885f8c661a4ef4004429f54bf1613cfa3be2767e525b920c46d4f6769f2bff0c114432b8e0353b8253e287130f3bd7a3a1a0a20d3d61126d3f8416d104f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0014c4d18c87c8157c9aae1ffa125be
SHA1229cf4352ba74db19e29901e82309a9f5406982e
SHA2564a5274d62db6655f302ea7ea6de3e01de417b4b99bc2ccbd9c6a8d46070df387
SHA512fff481fb08ca1ab3e08a46ddccaafb2671f9b8b0f549516fde2f3fb43ea3ef2caf6f5d0a238b4e69e67fc18beaea95ab94185384122cca27b551025330a001fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511ed2b50498f664da3d88c8b2e6e5040
SHA1660fa737719232e498b254d394cecaa717a03301
SHA2561a97be2566dbf4a558f4096111d19a1089e3bcba997b8f926ecbe966fbc8b1ed
SHA512ad1f7d7c57618343b7642f23b0787400cbe1f9b3a27b520a4ff912b13afcb51988168ad0b447ec74bd02472486cd20abe569f37cb9c36abc4a4c5ba7815ff6ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa205eb25ae9cf1e3dff59997910aac3
SHA145ccb14111ad8fd7047d6f66edcbe33a05219f76
SHA256645413a84d48ef0cf49ead47a56d081560e493049bccce8a4c1c23bf8472d674
SHA51268b211d05a4d1d9139d615e3fc3417396c13d9743baf513a06d6997e0a4d965e4df3d855cbac9bd95222f0a01aa9246f29885ce9dc87c9e81338e5063d9902cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5260f8ab3ed95a8dc8257a4462f78adf7
SHA1879f44d8ed0b681a9faa3fce625def301866716b
SHA2569b0f87d49b078ab522db750619fd0de6e097e275bde2be33f6affb271e31babe
SHA51240fe628e440d6bfacd5876c29653b3f920e9dd212bf8b971d48482156541d6b6964a7a0e73c972de6791da672efb44210945bf48b1aa8b5122e8807b7bcab9a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9eebd57b0ce158da73ff37043c730ba
SHA1339d60ca05bc9f6ef51462e3933d876cedeed033
SHA2563b0c7899ac9c026d45e9cc20ece1c889788395e895227a342f7629957c9c4469
SHA5124f4ea140a5b2eb2c9d61eeeeb8214a16260eed7ee1bbdf5fc94235d61cf408e7e78f2d8d0a458dfafc716029084a757d1add125adf31ba79de36118e961fe5ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c23a3e1de510bcaef42fd6246b96ea6
SHA14a45562d18b453ba970610c40491e26126adad9d
SHA2560211512907997025a4c081e538b8067796ccf516b81b0b474b17d369da60fdd8
SHA51200e44ae768ecfd0d9c382a906f641f9dc361db9c466b050e40e722030c786632effdbe232771be7c71287fa4de1fc5be33c8ab03b4b7997bbe35e0eebce730a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc6f0944419baedb061f4d954bcb220f
SHA1ecd570cef5ab45076c31b45a0bd8aaf71efc034c
SHA256b7849bd4d27fb5290046baf4fce2086a8ec6ebcde77c0a5084b3f14e8db4fc3d
SHA51276ba5b156f07b540bad645e0f83d724f5e26648ab0fdf3465abd7924d7a9f125c2931388855ede8c74f2161c92aad6b4078cd26b299cdfc991ca2796a33b1ce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5607400496882972b1e29db7274070438
SHA1ce1a268aef6a3dad35a7fd46e6c0d428efe1ec95
SHA2565faeb5d262049452e8683100c32438976ce9d36f7f420688ef9d2ddd9fa19405
SHA5127c927d2f6745109518d98e1dadb7131fa800e7cfc74b6190f74221f30fff050397ab0681b8a65f88d93077a7b9f48359c68b17a9d2d87efe9172c8f896419001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8bfa535f25a72122568965b20b007b1
SHA115b5faf1cfbf4e1ce8a0a99a29aff920ef02efa9
SHA2567596771a543feb4faa669e8531033068545de0d2b550c1a4d81a0c308baedda9
SHA512c925a8054a22a426855cc19589b08447269d73ab572d39b7bbd0aa79744bbb949303c693785415797cb78f2f7e65817dfc53535c4c842153a4998cd373bc7a88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521998774f13a4af648341d258d4360cd
SHA18ec3e1542fc218e858ae6520d0c5150d3dee6ded
SHA25645493fd2b7bff01927c5d1a8b5336ad2fd22b3f2df149959ac18a6978a9e2eeb
SHA512e0c3cd26d95357d9921413ea7b89ead5d53f1e150a617ab1927ef75236c013ac129064831a6203d41ec9aea3b49b451f2852335682204eac4537495fc6f006fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ad745e500c4e2886666f54e066a85f5
SHA15533ed57a143ab4ecb8607eb35ccebc7746bf9cf
SHA2567a2ea6df46285735cf2cc17eb8eabfa7dd85ae7838785bf7b20f0bdd1cd0d7d9
SHA51253162c860f6fa80ddb3cb806c3a2511ea6b1c3a57f492f12b7694548f84d4b0883f02845bc5412248936357c3f5c93c248df5b33c75a8af4d4cb471ac2b2e975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bcb08722940c78ddcf95f1596ac6a7b
SHA1470e503ee7fc5099c8de5bfadd8b087c96f74e32
SHA256207c7d502da1308e2e7cc8024d808e9e4b9fa8f76d24bee406eb16222e06dad1
SHA512116c70ee69a655616416cff0a6b464c696cb862ff7faf603fef1feaa527aee985734bb57e261ec8f89138177c12862428b3b8ad0be7c664c6d957461751b5a20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5728062d47e15cb6cfcba0bd6a3948928
SHA1fc827109b8bfb3fe0a83ea3a83c0ccd98791ac3a
SHA256910e05c64a1b7d210254235745677bfa9aee3c4a130e756c9f73f0e955446f36
SHA512635d31b01874e291a08249b5be80b2fde909df3c43cb74be2d09e82a1490246e29c3d41f42a497ea0f6e1397371c3f9bbbec06a1cd0e1aead83bd4a46ded9ff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7a6380f5c72ce7ea06f9c84bf318bfa
SHA109dee0fc7a11892035b48b886eee7be99670a196
SHA256d45cbe6c850ba1accb92078b4727a4fca43deadb27c3f420abbe9371fa0aa611
SHA512e82713312e23a76065479a2b4bde841853ac205dbdcb8fcdd550d3fca7e01345c8c3a31f999cc6e2c48dbd081cb66fe7bce50d0659b79d0b86917dcb4bdeeb7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c7f1d552c5caed6908777eaad41ab46
SHA16ba3850251c6d3d10283a1bde0be6650726169bf
SHA256979eb20b0ea683826913632ba4162c79974bbf442695f0e4f4e953651c0fe4bc
SHA5124f7eb679d09da0aa24551c80788eea609cac58f042c53ee6521fb56d22ab370dad5d5826aae6fda04b24819e7f9ca82403239d2eb3f21bbe4ccde78d2282e6c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5004916f9ecbe7e97b1e6140f95ab5f22
SHA1340ebd6d93614be85ccc7faccb607389396ff031
SHA256e926675bef20f89d6b0715c6b037f8f2942c7f35df58c7d91298bc35d92a9a46
SHA512d04c4306dfa8f4df27b393353615b1758822b870c1e0dc8b2a424a31f79368c0eed2c7342bde11e8215458cd02b5fbf255b40a77643aa7615b9302ee7c183d1b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b