Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 01:40
Static task
static1
Behavioral task
behavioral1
Sample
06f39bf9d6394d655d6e1391e9f26c19_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
06f39bf9d6394d655d6e1391e9f26c19_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
06f39bf9d6394d655d6e1391e9f26c19_JaffaCakes118.html
-
Size
9KB
-
MD5
06f39bf9d6394d655d6e1391e9f26c19
-
SHA1
2b350ca2b8983d27fdd09d31eebec7415f1bdbfa
-
SHA256
c3003cb8c962997b8dcabb2e117f2c6be9708f79a1bf886ec0b643f7761ced35
-
SHA512
745c9756785ad385fc268a919c1f281cdfa8542f341fb345b965ee339ddf93175524dbe7e33b5a001f2430c6cafdb224375c58962bfc3e700789cff6d31a4f5b
-
SSDEEP
96:uzVs+ux7bi0LLY1k9o84d12ef7CSTU9GT/kPs8bpUlVHcEZ7ru7f:csz7bi0AYS/UhUPHb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000052fde5fba022c0b3ff9186d456079c45465870fb0a01ba5171564657e54cbf93000000000e8000000002000020000000d32c29d9446e0d05c294967e9a6d46586188b7724fe3f9ef65bdb0f4b4590521200000000e9f7bf499ae3c9a1cf5182b23d8ac7f889757dddc16844be072cc5215f310c64000000003ec0ad4152770afa0c4c7067ac6331295d0551dbc9a4ca801c8c835beb728f1df659730c694fd91e80ae0c785aecbf3db86a86cedb47666d7368ab1e4517342 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425355093" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BB114241-31CA-11EF-B393-E64BF8A7A69F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60031090d7c5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1444 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1444 iexplore.exe 1444 iexplore.exe 1316 IEXPLORE.EXE 1316 IEXPLORE.EXE 1316 IEXPLORE.EXE 1316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1444 wrote to memory of 1316 1444 iexplore.exe 28 PID 1444 wrote to memory of 1316 1444 iexplore.exe 28 PID 1444 wrote to memory of 1316 1444 iexplore.exe 28 PID 1444 wrote to memory of 1316 1444 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\06f39bf9d6394d655d6e1391e9f26c19_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1444 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd4f5c08c6099f81b1fb71beed556cb6
SHA11597571d42c59b728309b9117ed0b143fde1e6b6
SHA25640328d7a9a2e7a239d3ca57036a28024901c5edda589800ec33e7d8840f29611
SHA51291249c384c005dadc295072bdc6e3ec1f35ec4e64a1e5cec2f599b2c35a5b2403c6e8632763e9abc9d350af50a26cfcfcd6fe366b38802779ab153eeffef469b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3cae7fddd11500c4440c28576fa7abe
SHA174b435c4b2c0eef125c7ced91d44a435e9b9db26
SHA256a9533190d5ea33dd72cd7aa21b10346aa8174c6743b8091074676d4b129a8d8d
SHA512813067e1b45c1430d49953a676d87ca530af0f2d62a34075e194a2824051b2d1ada024f5fe8da29e25e21e98168806cdada44517d9d8eda631b59a885ffdddff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556c69af4ef354d54b7ea2e75e70ded0b
SHA1061f04b5681ea19926e429a215e10b41477c35f3
SHA256cbfa9838bc49d6550f2127ed2a5c83cf1e5b7eb3f5616b34a8b7274bb5d053af
SHA5128798ccf5e49a882e381f55b551b908bdb1b85ee9c373bf334edf2f9539dd8f5a6a9c6362b1bafa495653282c6b2b638911031f9f0d93f3d4a9650d52f3408096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dff2c27d1c92f76676a8bbeca1cd0b18
SHA12eb41dd6c9e626ee1cf786d08cc0e766a4533add
SHA25623fb2799d9e8932c30b3babb002c22d317dd201fbadedde7df3c100c37e0b323
SHA51257578a66708c24ec222fa1ac29472178ec5579cb46d18c8661829d8a7d85a1c6898213cb72c066799201f7d7fd9a5e54b68d63dfe257b15c8d92a2051114eb52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a749d4831218ba0f2ae04ecdb8739110
SHA1bf702c71d53a433bd7859cf30e5783a1953cafd7
SHA2566abf8ada2c4dc7b3a098b608b84208c50b137a4fbf309bf9ba6e88cf2388a27f
SHA51247ea207fbcbea19be1131348bad884affb7926fb689ae26726b90831f5e3418443270bef86a7632a3772da8deeb3ed87b0a8ef8a3609350b7eea5fd838161988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594541c6826f4fcf81a21dd96d17c2e5a
SHA12a86d3f077b43b13ce9b6249eb1f80440be46b50
SHA256e87d57adfa046c39fcaa77a4cf9a18b12055586a92370cab655dcecab285038c
SHA512cd79244a47ba9119cd53d52b0c9e135b7b64ed258a26eac0f0d70edf3a9625ff58f7255c618855846bd59c92382565959cbf8d3761feba6aaa6033a565a520cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57004b4017eb28d9888f3f7389b89cab7
SHA1d7e280d1c8113031132b4f344f76b936fa8364fa
SHA2561a8863c521f3e6b8326c3324d6c75d0a66b0234c578f87a48432831b3a9a00aa
SHA5127c270198c830b571fc7c018f52f86a2339c7bfb4edf657574abc43414cd99cb448998cc6bcda61d5009698030beed9c1afd45aedf5c43451e499a004af618e1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501f3e9296a6c607816ac648154f98628
SHA1311668b5179279c015b45ff7b72734eb3ac675a9
SHA25677e59842760daaca7ef5259fe988282838a0d507da15e43ae59dbd57a8a56786
SHA512f7cba7bf1f286df57ad54c2fc96d7e4666cee384b0d820f6ebe68f622dada9a8bb4c754949a86eefcb4d8dc01b23ad42ad9dea64d8f316b164b51a718fed3e44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514daeac9d97b77ab80afc97ca2e91a34
SHA1baf375b04fd3a64bff965f2242a043d8657616c5
SHA2560e840bf38a10311739a143bf34abad660d04ef875747030dc07daf9629b2557a
SHA512a0d64374d84e09e9b559a06610df2af93204ed8d03b9419b32e3463d34d7fadd4282149ae8c51328504e429ceb80fd3390e1ced4c50ae69ea126df2be73feade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5549fbe36d18699ffb7b03ee0d77ca5b1
SHA1b0fce12b3ad58565f412dc66cb2b6fe0d862ee59
SHA256ef1bc31afa9ec68d70cd9c7e41f32a607a1de853b907b7df31bc0e170847ac73
SHA512673b31656bdd59de9f01e01876d7c76f2fc2dce362c7cb37ffb9ce847e48dbc2afef0961ffece2e23c93d549f07644dcad16b8096a45b81764f893f89755c14f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584bb9fe026a45aa32e4d144f2a01f4ba
SHA1625d8cfba18284898d555a4a941048af0b1e5e2b
SHA2562ea271857f4ebd1a03a32efc4d6ac36d7db7841078f53cc038acb05da6d27aec
SHA51285e8e1a83d90d2b7aa79d1138d4a1516a7a88b7d2301412201ac2dc3cdd30fb77e30aa4a87b416260e0ec0053106c658abc7f9b1ab847f77691a049cba1d07a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a20a8aa3223dfa441b0a291aee35025
SHA1c15fdbf7e484005ae59b386ec5ed57e83851236d
SHA25617f87b107cdc1e06cf37c358c5f67f243fffc8e5106f842121937fec0e4aae6d
SHA512cb3820d2faf171a724267a61ba2859ab7c15759be0af3fdc8914c103b140e85bf8d5422a76988678d8934f8950f0f16dfef6fb9f868404013aff6cede2f0bca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4c0be45dd7fac214fc11fa43bf80d6a
SHA17441dd4814e517a3365a147568fdfe73b7ab4cd7
SHA2565d3cf8ce7d30568f0e5343f011e8af42b7e316fe2b609106df6e8e3248d69629
SHA512de125b82478305f0eb43bad8431491a4844fd338e3d6716003906fb2221ae5878b62689186c545ff143e657a457c6f8fd2dc1c601bbd28859d3a00458a2652c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf6f7837fb8253660821c51801a3a57b
SHA10e45bd1bcfac293562913524bda8c361aeb6a7f9
SHA25661639c073361ec1982c100d4b136efaf16da28589a403f16b41b83eca1b5ed16
SHA512ec9d525ce102772af515cdb35371f22661b79f47983bdfe54d75594c10c27654bae0ba7244b6daf3fb1879feed6f416137a52627145f96c801dadaaa1502b5a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57af7cf85cf1b29bd49e54597b518b5c3
SHA124387764fe6b75202b07488d9d47c67198da139d
SHA256f11fc22c140f128182a02becaf9fdebe40e6bde5f4bdd2897237908d56e91eb2
SHA5129ac4bf92279ac213ba65e7737fe29110d0a5e4f67a65a296f37b5e9ac833731abaed514b2100368c3058c28ef582f8aca792438bfc6a973a5c4925defc1061d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53abf191314b6cb213506da824888c970
SHA1f8f4abe0826db50af5f6bb925fc58f652db6383a
SHA25600c069b8e85418ff1f6f471c19aa4296f91b60771b879aa93050bff3fdf25db5
SHA512d2f1636f22255ab952bb853bff69b28baf24d3420ff058523c636467c1a8a75d44443e9a492a01aba614d767c5e2af1dc8acd31f242913ed21e54c8d0310a12d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e09de56c63e9a6f674fd77f9c485f4ca
SHA1b60370edaa2448d26797aaf34a0dba2a1291ca77
SHA256a773544cd4bf798bad5430654444c8e1e5e5728d3107bb8a22979a5a9cf36e28
SHA5127a5c9da1f1fa168567922039f61b27e0c741dc0d997f49011bce71c36e4f909d4495089822aac36f59456336a1ab2066674d74c72e33e889245d0b820414947b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c295910ff2ad7200e7e3dcf36a5e0015
SHA106a5a32c83f43d5d0a7e41a22c9971a29cc52722
SHA2568e5acfcf49d4622f1d7344575350eeaf6ec1ebb8d90f954a58f822a0c27004e8
SHA512565a63cd5ed78a132f55d714516137c301644ce5db926c07ca23c02da70857e7dd163f2e94a6cb6cd346d3bedce6ddc6b28b0e1dea73ece4d3c90d13aa1c5795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0c8618e453cb8caf65f89a3d3509143
SHA12d4012a5509fa9299fa264563dec18c359f42434
SHA2568de39448e37fe298a6fb348165613687d6b33e3009e85c08de4ec4e6f5f759ee
SHA512badc6d3a916529c6fe130d5955c670382dcf1adeb832291a5d89acb50304c65d79d1e2db6701ab991e5d933fb28286cffceda2f7477bdd2183f57cdbf9ebed68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588b852486b5597d033f7d2869d69f9d0
SHA1a361aa607bc6b203450ddf41c76c1fc291b2ea56
SHA256230e14643775b4785ff53cc124f0c495c2bede67c48fea804e0855b4f6d76eb1
SHA512a7ea56a929a3c07e671f499e4a17fceffd487ae08e5eafcebfa63b51c2c5f2a271e3b08c47bbde533280ef31445bf09dad03eed079b38b9cf3045bba1508b1f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0f01fe3decf38926775874ffccccf6e
SHA11b9772f968f2270dd33afb0af2e3c933af157095
SHA256e4ac30cf3fa6b330aba699bea3a5ca6ca04f28a7c63de4feb4dfdb9710a30393
SHA51296a5ed9cae507613063fcaa71c71b133af57ef21b53ffb03c3937ad30a851fefd4b85d066585c88251679582aa924c1913ef1ff38002fec36068285c34099ec2
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b