Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 23:38
Static task
static1
Behavioral task
behavioral1
Sample
ac0a77357db8e3c247ade727bfa126c8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ac0a77357db8e3c247ade727bfa126c8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
ac0a77357db8e3c247ade727bfa126c8_JaffaCakes118.html
-
Size
27KB
-
MD5
ac0a77357db8e3c247ade727bfa126c8
-
SHA1
62efb2da7b4303f9bbc45b8c3faa10876e608053
-
SHA256
147ddf20ca0ad9ebb5b03c599ff07c50b1c1c505ce98f470d306d00656f205b6
-
SHA512
22e6ceb106fcb1151bcb5cea72ff0d8e551ee14b75ad6191ff4e30b6acd171b9e67ff198f85e18ba77c5597f0053651e96ebc92ad3ba89d56a3d5e250d767185
-
SSDEEP
384:Cyi0AYE2CpfZ3XAJNQzIFnXPKVgIX4Uu1KVgIX4U0KVgIX4U+KVgIX4UtyKVgIXo:CyiOE9fZHIQzI5jDBTtgp5QSMB1P
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f017dd16b4beda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424570196" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3F6AFD41-2AA7-11EF-B5E8-DE62917EBCA6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008fb22c532607c34ebb43809da6eb4248000000000200000000001066000000010000200000001d571c65cfdebe5820702fa311bbbfcfa6fd04f50cb1fd7ba8752be714b1b6a5000000000e8000000002000020000000db448b1a82f52f1bb3f7407511788ecf3e4e2e14588b517c9cc6b666bf806af420000000c2ff3b3a7ee40d68e7be8759cea738ca69c8035ce6d1ac61367343e5730bda374000000025cb8ae537476b9c432b7e885a15b23ecb5891511c5f9dae043a515a2a5bbcd93d57f3f70bdb278c642ba9c074777548ae1bff7cf1784013fb702759e745ad3a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008fb22c532607c34ebb43809da6eb42480000000002000000000010660000000100002000000059a772d53b3a571e2c0d9a10ed3acc63303c43a621e7d2e17a52858223b536a1000000000e800000000200002000000005077e67c1cd062d14b6a07a31ec6e5a5f9c14dc472a31ee27f00abecfa6bc959000000082ccc31de0fd81367ac42b2578e7c13a024e0629b5ca50eb3c7cc9f509732a33d15bdd5844c3279bba1f6ca93a09ffc9719e7454c92fab56c340ff928c7b23eef8636e5686d50df5f5464f84fb12631670f0607e6cbc3aeeba667cb65aa2f9feebc7d7e39fddddf5549988f867227b0f1cc89b890bf48ce8429ac314b050d12a08b98d27758c6b98c704a5caef0b09be40000000e1791620c4bc08195c0ca10b637292c6a726adabc42a144fba2aa7a5185d4cf12e3b25f94c84083a08e4e5390171b6b603ba84daf21b480443db35dcbf2f764f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2804 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2804 2196 iexplore.exe 28 PID 2196 wrote to memory of 2804 2196 iexplore.exe 28 PID 2196 wrote to memory of 2804 2196 iexplore.exe 28 PID 2196 wrote to memory of 2804 2196 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ac0a77357db8e3c247ade727bfa126c8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56795c8da08a9bed160992d36349bf62c
SHA1f743a39a16c7436e03c02e0453bdf95a14e87a37
SHA2567920542182042038bb38d73accf3a4eeb074b048d3650f57e71f5c972cacf6d3
SHA512e436106f900a1ce39d3d28c7f014d28db3a11db2a2d6de3de23eb1c0429b00ff6198c2fa5ddedb630525c303654062e9f08a4dab74c677936de16eca1a023878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5094810f1daa20c1170aa9676201d8783
SHA10bb31a552e0d1140fb653834138b8be19ec30b13
SHA256a1c689c655b34e9dcf199fd9762366f17be8fbf3344b4d78137b36c0ee4b2b6d
SHA512264edadeb4e53ce0d66500f0f2972be3e81f01dad3c307364740f043f9211e1bebb621051ee0149858b6bdf49988c31152fcf86c93f67d8368766dad39b612be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ef98413ac1b87cef7762ae44062d8ec
SHA192d1403e1116de0ba89bd68d6eedaf420ea7ebc6
SHA256a186f5a0b2a269e990f3799afd451c5076d49295e8eb6d498b6a3cf47149e6a7
SHA5129fda52be6de3df7ff44df1222c1db4a3f014976009880b2c4ffed1c8d9888acd6b84218919716f775221a3d614d5cf8d14f2ad11a9710a7a1a9ee26b521ffaff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e152dec517b79fd8601b894ee2a6937
SHA14182aff45e3920ffe7b81c296ee4e36f408e0c1f
SHA256cafdaf8cc0f2553a4a357767dd13b3d4aaf0843eaeadc211bf630e1fbca15a7f
SHA512781bddeab417b75ad5c7ffc5cce28dfec973a96ffbc6bc9f0d46caa09bd7ffba2d69f528f47cf6eec72d9651b683e6a6feb3816dea19e8e90c8d9f9318a8bc9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ad1dbb760cd4bf180c4da94458a5347
SHA1a58099d72193c54c454736a33d7515e8f0c2e47c
SHA256e9f240b920b138cb0a52325cc7503cc13b6cebfdc529b063aab1d9f11656b45f
SHA5123dae7bee4711803ff01d667231b67fce3c0bbe1e08275f8defb18599c7c04c145e2cb9c107a588dadf858465436c6234500869fa4c008d2ea1a4737f0b7f3c77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fb0ff497f53fa09e10de6147856cf3e
SHA1b3def3b989d58cfe96d10817d6f87207ce589a07
SHA256056cd88a25ce078836870e8b0784157a59b848d113a18d134212a36a9f27f3bc
SHA5121793e8177c2e521dabaf7663a484f21cd1265fe62a24bd2103ef182c8fe2df8ea319d730e5425d67f91e2256c22487f7831d423f4145524a5b112adef0bba7be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2ddb49156750f0aba98842c3a1dbdf3
SHA10df011c75e57562bf4e0a39caf51ccb00b0ccfff
SHA2568d9eace7039b78e5324394209396dad6e52e90e2d193159c0a227f13b15b6d03
SHA512d9cfe08048ddd41373dce314e8222fe418ee9cf751b7fac1b444597a06d5de2f9bc1d2aeb6e7c32df020f644de5af7a5bce50f5ee49beadc0da577a64d0f495f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c6cf317fb75d568160ea4ea3724c6b9
SHA18ee909d53064b355af96eefd79ad7564c4773b11
SHA2564a2484d13b09d7a39ddf9e7bdb06e8b86e995b0211ed82c9716d1531a040c9d6
SHA5121b25cf4500ad3e465dde9276d9c449ba25296b825dbd1cc5d2394c54f4c35b64d010c6c3680e4e9a12c0643f0229ced367323c4873e931bfc29f713ae898721d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e5657d4de59b1de2efa572bfef2a82b
SHA136c05f532aee9054033bff9c3a85eac4e1629cdd
SHA256d2af3a4372cf76d4aa569ca15b4f942799a3642063958b198f156e8565b89a6c
SHA512ee63f438dced0f1f8efab0fee4a88acc44d9d9987fa9498619e11ebc302cffad9fe9764a96ccbd121404e8e6a3a7ee1841e09fac51619deb09dd7728178789fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba624fe613022b190de4d234799a4c3f
SHA1fdb9c9e552ccead259a116e037b61be61845f671
SHA2561b51468f371e726f3b9fcb44e70fa066cfc35cc4d7db2b7183f415bd986bef53
SHA512ea5370a35ff569ea739da3112d1bc43a2912e1bb78c263bc5e97b9658715ea2930186d3b32590fb0b3a64d462fbe0a302e9e7f43318d163cfa4276a2cb342e5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f2e687257372e8f79332c0d157bb613
SHA1abc06e90b06a36928b81b7a175563ccb31b3de08
SHA25614866dd46096b178e8b726b93cd54cc43631327db8e6831267688117eeff265e
SHA512733c2196196e3fd322be8e91fe602a57f7cab2fe20507a808e0897a120b1e8fc37ca8122f6bd1b619b441a60b417e54a0190810c3b392c7ccf22df8a52bc9170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5794a2c66b42a2146e1b064ddcfc2e9b3
SHA1e4f74448589cb8b7cd19f2c865be03f68191ef9c
SHA256d91a5ba245e1ace67b8e6fc7707c87c60df29502c5fb78666aa50e5652e32477
SHA512d38d465e26c2508550edb20432fcf815c665ee7de12ebea0b1d42a28901e85cd526b678c135b6736e636295bd7c1b1a879eeb77f4a4aa68d878ea26522d53751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a9524075441251de20a539c2cbca9f3
SHA18d5ef2a0b3e6ef2ede9ecd5d3d7a81c780730319
SHA256884ad1170be3bd24ae8eb41e8d39fa4b0a935212912864b8669270aad68e7e5a
SHA512f830a37fc3f637501f90fbea98a6647db9ed81c0c0d566d971a78090ea4c2c206bcd0ae789d633901b3ec8e2f8ffaccbb16d561bf7baa42e11a49b85003a2507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfefb38c8ab8eafe1adcb89d1c8bd88a
SHA15f0bb361806d08c689d6b0396ddf7c9a35b85b54
SHA256b54845c95160b9d6840ff4ae67aa9eeed31ef12e702f15d51b468060de19e383
SHA5123c6d45ebfce58e7373c7b327235266e6a2cbad275d5467c10c6f134a5c87659026b7847173c19e7c902a9e71f63c89983049c7c3b230095e1d7cd6e52f696fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a0e58b27d997a956a48a54937d7b01f
SHA181c26bce9a7fe482db8813ae522fd5914a1118c5
SHA2563462f9c89b47bdb28922822c898125c06d82605b206d6896cbb9fabb0fb4861b
SHA512dce768078767a64cd89751885c37647c4817e78b5078f4188fb35799ae193193a53606c75bdce04daecff31ec57d01663395779c791c48cf10783a55b58c1596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f43969d96dff8f3e71388281e0044a27
SHA194e2313a9da8cb88621d18a9b6da71f9d48e6aa9
SHA256813bcceab008475f5e058c57bfa2096b02302acd2791785321eb438aa2e6f5cc
SHA512d8aba0a3ae7dff32a861696ee3d8ea856182bcf57b74a64354a6f6895f98bee6352e2d1f5a0aac4a965bbab0d955a8d01568b2994c703c563717d8d8589e366e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be99d02965c9b8121d9037d01670356f
SHA17e46ce89741cde56e72fe904926d11d6c59fd1eb
SHA256a875c2522a8662ad1749df58a7f2b66e46c36786a3ce26ee3f1bb818ec3caf7c
SHA5121c11bf618df2b250a69b0be1616e627492319d72c25ebf34da29800a3bf862e0aba1610ddec7f9a35be18b6d0bc79f62997f2fb8776a04ef95ba9afd12006629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ce63aadf882a075e7c9733a03a302b3
SHA16d7e079fe73c98641a965e522c5f0c3a9df6f584
SHA256121a6168617dd7b214992b2a3f1b49769172da1bd1154983cf49adaa54ace959
SHA51289846eb56c195c659f988bb4b828a3eabfe39b6f4b2cfa12a043d60d6eb653f31af7c4013a690ac6e00708765faeb279cb04b4f46c643b8f08b4f70bf6ad1eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7164bd356345ef4362ea1b4ec85a099
SHA1922f8da8cf595dea2be346bffb570e193d80df93
SHA25670b658a93b4721f4a5a0b58bf18164448b554d26ce2e843a6998e999d17bfc13
SHA512c219fc616635788343e476b100125206a032e46060578cae4b72af42c0f6cf81b34e0d6a16b2e21f973e5945f2eb66d7cebb9d4b4a22aabbb2960e210579bf2c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b