Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 18:10
Static task
static1
Behavioral task
behavioral1
Sample
ab11763e86bcc8f9ef1408cfadac1a7d_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ab11763e86bcc8f9ef1408cfadac1a7d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
ab11763e86bcc8f9ef1408cfadac1a7d_JaffaCakes118.html
-
Size
10KB
-
MD5
ab11763e86bcc8f9ef1408cfadac1a7d
-
SHA1
02b1cf1ec6c3c5ba77d419d6c16799102c307f02
-
SHA256
fe6a9233f8d3709992ee8e980071a587c2c6618b8c8621c44eef656e57f31eb3
-
SHA512
e40b0bb06db5b4698a964fddb78281a0b6d04bd286324fd3ae80704f3d058e576976c41f8406c5d5882f011b279f8d143d85bc99d1b748809f57c10ae1265180
-
SSDEEP
192:HCqeEkYMEblDOh57mGhfJdY2CkS+j+eoKA3hS4AZoMoPo5N6W73L/:rkzGqjM2CkS+j+eVohS4AZ1esN6W73L/
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424550487" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f017603086beda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a03905000000000200000000001066000000010000200000006a9bc4b3de36f8a1df8fcc23336dccd9f303bf2a066e4a781e6365704d09a67d000000000e80000000020000200000003807d940d786da134bf7653db933da100b2bce2b2f7863f3b7ab330cb755f64a200000003d246231f13abf90090575a07e4159c4674d01604710cd89ac4583257e82c9df400000003fb13c33b90ef26fc47d2ac139cde3f9995ec09e4e7b94e65b5f1f213fb90a1e79b6fb1c63468b252c937ac54a2b7b7c9831dd2487b7f9ce9172449512536fe2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5BE57321-2A79-11EF-A490-4A2B752F9250} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a039050000000002000000000010660000000100002000000046b4c33ec8cde43e3368a26e1f9d3aaa4c04520e9bb8934361f46e103a22eff1000000000e8000000002000020000000de65a237fd01b9ec124bd11ff88a4e5ed191bafcc6a647954df6026b8c08fbbf900000002effc41f04e6f6ebff1b57b1ac64bd9aaf1518e3203e869928afe98bd3875f9624dcbf5cd03f5de8346bea3c8ffa8469e2af505fccb895ac278d0db8555e3113837a311f4777a0260a22a7e1a52cd6065de91d23be784f380044dbce1f313347f20c56464b11f4035e5651d9875fbd13be680881cdae9e264a0b126f851dbed45b76fe8cd5ac40204faf95fabc8f5a9c40000000600eddc318d72250c77fe91c38c62530b29238725fe5f3d72f90e58897b197fa0d3de7351694bd31c4295a72aaddcfdd44e7794090b533156c4a6256338ca076 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2108 iexplore.exe 2108 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2304 2108 iexplore.exe 28 PID 2108 wrote to memory of 2304 2108 iexplore.exe 28 PID 2108 wrote to memory of 2304 2108 iexplore.exe 28 PID 2108 wrote to memory of 2304 2108 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ab11763e86bcc8f9ef1408cfadac1a7d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c33dec89017b1912e79552afdb6b339
SHA16e1e9bfeefedb1fc326ac775a317fef62eb5a0a2
SHA2565d2d11c30fc4491acde8ffa24b425c6948b0c8662ea646511148db2de3b4ca88
SHA51260fbbdfa61e2472fd73581eec0081ce4202aa7147b0f250cea10aaa1eb7c0175941e1a06e4a93958fd8bb05805034f5dfd99e2621ba53e757e138ac5529ad8f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e77c769842a85c4b3f26362c162ce400
SHA113f59e65f0bc2c24ed5c6d4763a3c602f1c9a8c6
SHA2561df1a30320b74917d0f6100deb0c9380512d8a2b8a2203e05c08a3218eca31e2
SHA512234de13fc6c43967881da8324d564b956d968f5865a911043cdd106c9d33a6a2e1d554fe26d58fe42f11be9d8ffc63877092823f79ea418b1fef39948c9cfdd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b58bb0dbd5179a6df4141d1eae23d91
SHA14bcbe415b6d3bb1bba199061c0c446109c9b0dec
SHA256e9ab0efee2bfb445d4e7b972221fc96c58dcd593100d81386f6969edba0888d5
SHA512752618fa13b436dc902038a88a20a6dc216225775f70449506eb6ade4a4e293cc2142196a91306868632d8e84f525e480df1830e2e6b1f49cf6e278591033ccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8f5c69a77e7ba5a91c33e443a172022
SHA129fc53526b9eeaa27488e004c596bbf725bb350d
SHA25606ae9dda5197209b8a19a77fa5445e52c946e65e2c745377f3b50a0a40b1cb1a
SHA5122ff2800a650b9c4308ee6147c3325748db4e477998583b7a620bfe84454b104614d6fc5639d87c53d1c759245781d2e6d0942e13c2c9e206ab437aafea1c48a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503340de5f2283299fd9326cfdb95355c
SHA155d0eaca870e4171194452b70113a95181242ca4
SHA256ee8696ed10bbd43b446f94811c068694d3c0cb1151ef5dd75d08b58f00fe901f
SHA5121b94dd8636abdd9f260459eeb3b2ed2d4d1ad0220c0a56a499c5ce15f7592c1dc74f5bfb489dad19d797acdbc21666a6c9489a9e3e89354fe252b587d8ccca23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df69dc1eaf5353e3110572d4ee29b5a6
SHA13f7d3e9cbd1d6762cfe22a9232581b7a783c0f29
SHA256f93527fe771176168fd179d2640a996386cc1baec7f1eabd89169ee0238212bd
SHA512eba6d321cef46dc9efeb968f9138deb02fe9ef7fa72c6e9397e9d6e4c2980e0e21ca7830bf4b88c3cd6a646544407e481b512bf91dc8c27a5ceef3bee47e7930
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5216e271201b6cbf51780f243e7858acd
SHA1cca100a8636340dca4c26136c4d623e24c3af2fd
SHA256c2b3478b80d737d95982580d35974ae2f8686e6685adec42d5076925a3bac62d
SHA5128cf5b14779d8def230bcabe8d4511424749375063ee5f31c1e3bc2d235060ebc86ecfa1edca9be69dc8f24c47c97e1b15b9bc53c234748e49618d70f1679940c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ae84a5352192e9f928cd630ed74457f
SHA1ec8e43ff64fa5bdc6fc6dbdf2f8ea19c9147b883
SHA25691916ce16596c83a979c193f4855a86a8b8cddc90dbdff3d2cf3f4a070aeb26a
SHA51281fb747bc755635baf08fed0a23761bbe9ff92490c10fae232cf96eb4b8530534d46f034147feaad66a32674b834b616a7ee1714f23f19cf9c406698a33777ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508118085e66060796dba45d0ade36f1f
SHA1f9fe2088ca0f9bcf383f8e50eb04938fad5b9f05
SHA256f65911d46311b1fea87c35a68ff16bc0f09737b4ddb016d6e56433eb63ec495b
SHA512261b56a75b82197c2ad24b72ec6af22560d5dbe7aaaca8cf5ec0cb5378c297e0862a98a898f9b73321617395d4399dc23f9ed8c437dd878e2e09f815bee5751f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1332e8481e547fe46c9c050747c75f0
SHA1543ddb21b2d6b666fc5e87d3fa2325a252c40b03
SHA256e0abf3e06a472b7a9ff9ff60d002d8951a9514b853c7146f3db668d50f9c00cb
SHA512e166441f15c1754a8fc85d6cfc1e7d6993ee9b58ca905586cc99b720949870b32d8c807115f8e6dfafdee0aa989f1e9da7e49b340fda51fa8dcda612a85c293d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba7dbb71303f52ad1a348d053c71c1cc
SHA10eadff0f98348cd243ade4cd07aff03c06f09bb5
SHA256a4b4d7c7500fc36d3a9d8dc1639d3fcd7dfca294477d280aad1c43eb4adf0b8f
SHA512a33fe39054b49364ea5e7d8fc3f826d332c1db27bee7eaab3ea53e36992e4666da158808a3924897118b7e77f70262d35513cdcf5075cbf7641a4935d8670dae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58637f899014826ead9b4c2f7ee9108f1
SHA1e611307c7a8f68172d2e4f06bedc543c11799e88
SHA256256866153e387c6044df092ece6199c1d07ef1e929b7a95c82e1d0d1c55f216e
SHA512479ce5a966ecbb139e6f23265f6e9595fe3811975f0e23a8b5376f7b20acb64f880b5e0a314ec66e836c2aeef281823d72243768c3a2797abee99c0787da7457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54be03e05d965ae31ee1625c358aca603
SHA1e6e5f9bc64a07bcffb09415e534de7849ff11adb
SHA25600cb2a04285302ee7291d5ec9cc04bbaa90dcb4ce279ca338a276f9bd337be17
SHA512f439c8e464a066cb51b4ce3c26b5d81f082ea379ca81c19bef0c03cdded71be7c677191e7bc6825d11035d6ba84105b45ccf4ad2ab399ac2701d102f8ebaa1ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5216e294ce14daf2d081d3c6938555d6c
SHA1db91f15269be581ab1f2acc778ce74826cdc8dab
SHA25659624045fb5cbc8acfa93ffb3daccc4b2343991a12ed894c58493a512f24d183
SHA512660aadc621e3b8f3ae7c4c6b91f9695b8044e9d5a01a1f999679637827f12f97f1244e8cb27ba6d9d77474d72d1ddb44660e806170e9322fce3e229cd3ba1716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5120e7d279c137ae2bb0805fd660435bf
SHA1ca64ad2157045c74c9e43a97f3d13e3a4395b188
SHA25607a5050d0fa7d2e26f08376d13697b8893017eb10e64aebb1f44f5bbb01bba3f
SHA512cb75d60c72e24a3c5f0fb055d61782dabaa1b352300a60e98546167f1923e4b3f54d7d9899a8d9af7b92eea91fb8465606bf3b0ecbf00dabf6c520e958149e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b75707247547f2015f215faf045040f6
SHA1c63124a957dd4e9667671d10b584b7e38e8757f0
SHA256bd337c0cb96dd94b41bd4e547efb5c4530c9cbf03cc6d0ac3780abb2f93e43ae
SHA5127f6b62ec58c4a0945aacec7d5ded741921093456db2203650d966df6b8a20af3e044affbd1c84214648bcfd56a7c91c1d3210bacd8f7df3d934ab5dc6a473823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5907a9d61eeb16ec3e62b1a6d9afb4e16
SHA10e0df96ca415728f67d7779201269b2c9fd70a91
SHA256259d733860264e6860b7db8426194c99fadfc87848d314f9db2b8fcc959567a2
SHA51243e830d1f8f6a365f89fbcf590dcd1546e550f23ad0b8113bd380044876c93204697f7c389b23c58e101657902d84f6962baa998aff06f1b4d6e7a2a1751c7fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5220697fef794a3dc7bd581d4bb9a259a
SHA13e6324d6512637c5c07342c0e465087166849177
SHA256361898e353276301a13d68e2f0347336c7f17fef3aee28889e489e19ac32f09c
SHA5127e020ab49c7b0f6da6f75075f6bb1e38acd41078a87e97a2ef7d6a2113f74726cb5ba05e1ba1e1c3d8c5fd4f7b02eea264a0f1cad9f14d308e858a6440f0cd35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5b3f1b83911631999992aeff011510a
SHA1db1e8fde478942c1ef287a0e2783f160a84d9919
SHA2563df0a63dd925969a64f2e9e7028b7510e5a842f9f519fa606d69dce41c639771
SHA512a98a1a2985552c3e42be24fdba525a6fffac3199f00cada098eb269ea62149c9bbe1f403d2cafbffb74dbf34b6a679681aea73c343eb604ab87ace36f1332621
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f3bb7e416c1a7ba4233b503b20f7e0a
SHA1b83989f064a2f38c011d6f72de8896c411b32bb3
SHA256970e1986119fa05c34c6de9d7d3f485cd06d698f1874c3a3d4152f4547a065ca
SHA5120367aa40d0d0e2bbd9ebf21919753d43d83599cdbbb70722a4f85afa0faf854283d28647bdc91c27ad604b5bf7f276157c6c94d5afb2276ec5973dcbfb70c096
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b