Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
43d8faa1c9d4bc2a463a83b21c73c6c1_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
43d8faa1c9d4bc2a463a83b21c73c6c1_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
43d8faa1c9d4bc2a463a83b21c73c6c1_JaffaCakes118.html
-
Size
53KB
-
MD5
43d8faa1c9d4bc2a463a83b21c73c6c1
-
SHA1
a484ae9308e3b482ad933539fd44f4654a8aadc7
-
SHA256
48af8fdf5feccbbcc2ec80f365575752db7991f2eb56ebab89b574aaed076b5b
-
SHA512
7b21ce4c708904b6acec4972d83d1f9219d38fbe41ca3ed91795beab6d781532bdbd972baf003f12ecea8075b4c700bc79356f0398578227e8ab9471347ec021
-
SSDEEP
1536:CkgUiIakTqGivi+PyUcrunlYQ63Nj+q5VyvR0w2AzTICbbBo5/t9M/dNwIUTDmDp:CkgUiIakTqGivi+PyUcrunlYQ63Nj+q2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F4FE26C1-4184-11EF-8BBB-46D787DB8171} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000006c1286c6d51dfb7eb1cc17a78229a0ed3a07b10f9943ee3c35309f32f9f4a0a3000000000e8000000002000020000000e1e16e356007b778d5a21679e4eb359c5d2f468b6710913bebab798b53541e14200000002e29a4e4c2d46c526187a518821876fb4425dd6ca7ecd88c061e1435c57f37c840000000b81a0b2e4b9fb7d03da2bea5db16fd0619bdf7966c8854e6f1ba7a5a4615d8eed30211dca4271c3a3df96c4e4b42af17335bed958c514067d8eaf277774ad3d2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000003b5dd8624e20be20e9f275d4dd54df533393610ba691cc7e5bf9202a65d458eb000000000e800000000200002000000036e784366bb532dfd472e46afcaea3ca5db92e7044cf4665f9e6d34c8f8a30d890000000251bcae973f6024e98d7ff37cd642451260c439f17c136c2636505ceed05c85b5af89610e5aaf71dc950bfa417e98f1b2d91da51ff6777e9e45c99209cdda82aca720754c585371be2cf7923dff18fd3ef3f9d4f27bc0c5df76877948195c8cd8da09b43b5f0101c97961f99d76588f58a810bb12c4b3bda6eeb4972a7c3e76b64876b67ed9b9d24f73cc80aeaf77cb640000000596770cd516b132513479368ffeaca94fde05155422ed855c74eccd27787c0e05f9561ed3b7c5cfcd7486aa41d9bc128a5ecae3449746913fb08016a6e932500 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e07d55cc91d5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427084345" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2116 iexplore.exe 2116 iexplore.exe 1396 IEXPLORE.EXE 1396 IEXPLORE.EXE 1396 IEXPLORE.EXE 1396 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 1396 2116 iexplore.exe 31 PID 2116 wrote to memory of 1396 2116 iexplore.exe 31 PID 2116 wrote to memory of 1396 2116 iexplore.exe 31 PID 2116 wrote to memory of 1396 2116 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43d8faa1c9d4bc2a463a83b21c73c6c1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5853f32f6bd335b840033b3e86f764220
SHA1db521d5494d47914ad0819f22953a61a9d853b3f
SHA256a4dee346605a910239ff65af6460c9c7e18f075ab3b4a5796b111b741d859387
SHA512c7c425e35f05a3ca27bfb2a104f549f7ece13811ce7e0c78db1f7f58a646073fd4c1aa27f968e6e42be296dc5ac8a0ca2f66c190da44147b55cd247e7fa0cf71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab3750e4ef5436b44a63c03375ca5725
SHA1d57edaec5fa79821dfc15e75bbd88109b0976ca2
SHA25685b42de489723bb85a8096337b3fd02557ee8e903e4b21c748ab1d739f998f2b
SHA512c548df65f30567d289f97a3a8eb533a56a8874ede1f54aa609657ef3e1350c6ef1a7ad974ed66d55da23be6c4a395893e84a097fd08ed15af79ed264b9642626
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5541873a5e7f4262525a7320bd5eb131c
SHA1b63419600e0a54b462076e4deaa51916301f4119
SHA256d759fd78ca1380902116819cf3bbcbb9ecc8e1a1498fcf91a9cdf92934edc721
SHA51224886d37b40534ecb4ab5143c04c6c8276e145ba0d354e1fda46fb16ea61f9b43e3fac335cbfbe4b418e31d014392100ed907e908a5ac49970e8829906678ad8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5adb237861824801fe1b3d597ebf8fe
SHA16a077863336b69f55784e9a0492c67fee016bde9
SHA256476461c7eb08fc3a3b136bb7fe8e3fe3c728cef37243fb0520c116f77a66c037
SHA5129636d9497db28fcb992719dbe63ef985fa37e433da6734afc860563dfb368143a741d489fbc83a844b81cf5cba865dd4184e02a1a92f07ffc60752886f056e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a6d6bc08545c0e2c1f1f4b2bb0bc36b
SHA10ae0150690ad72c6ad9bb54c571082bd630a09b7
SHA25620eb6ee733bbde76117e4ec3c9c1e19c881d15d70855740a2ff320678a49b2b2
SHA51289c38cd1a9ff91f18e0521cce44ed1b76b7b70fb18f75f9490fc45938a51c1f8a7e3ad77ea3fc9bce39a9bd5f4cc40e81b7b2ddfa2ecd3f4c3041404b5a2c6af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd2f506410d5ec85f19c766d1e7a1ab6
SHA11c463ee1f015f3497ab0de8e1ce1e00ef451605c
SHA2566620397d9f8ccdd4fe6bd03058c8b8da070473e73c13d2ab3afde946a712090c
SHA512a50f79490a36cac70ee4e2800ef26af8754b6129de7d33a7dfdeb5fd1be3d7316946deca4923bb8fce1939d828f30939d54fc70200419770c461d627db0af154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9a53fb2dee14eb0d22aea453569b578
SHA19ef423202115a956bbcee198e85595b518f0614e
SHA25608f7c42f28effdff036ca2f84c3b58043c06b1fe2a4e6fcf0a75f189bc9c29f6
SHA512609766b4ee4ffb5e4cb22d94341ee034f92968235034e0742758cb2795ebdeedf4ee9a921879314fecd1f8e6ff09b3c9f007c46784e5b496f6c28ff66703a865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9a7cacdee52cea1ae5869249d0c7f8b
SHA1ec12ab24b41a5abaad090494f2ec9b72ad469288
SHA256613291c958efebed06701f5480ce092e60a870b13031aa5a2cbf5eff3989efb1
SHA512b7ae477e4a7e3aad00b9a5a4a45c597fbe95f89424eddf19cbad4d2b1c6820d21d732df47839a9058a3f947748a3d6cd2f9d70908d552854685e5d279d85cc93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdba19d46338ea0ab8d3b2e2f9b6bc0e
SHA168e090cb439f5cfdc3b4c08a2e5e177517a3ad1c
SHA25621358a9d1fc714ef05ad31ac7b838d625d11c60623339aa66e739d61e677a269
SHA51234288b6c2adcc4162da5300dc42a1f3bc89bd5142eaf9c6af8603933c62e0d1c6a1291cb446fcfbd28e07276c0f64a68c04307d42919120644a9901556830caf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0dc7f8f712706c22714f72a777e7e5e
SHA1d31ee6adc631521045997a35e32db60011cbbbba
SHA256b30cbaf86e910bfd7c1a2bf934c2c361ecb4d350168992a7035ec6ee6b65d8b3
SHA51279bf90034bd977599a078505559fdea1e14a18266f4df579b6fb92eb76112763a0c2089f90127770c96b7163b40ef8f9848f6cd9379160bfa704d68734dda1dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fec6e37cc81554f92f146e85e5de943d
SHA1dd80f893c2ba40a7f80fbe3c1f9831ac2a8f03c7
SHA256d57bb0a70ae283db9bccc5081f5bceb5b0e83ad89179d77ae73d88d4fc0888e7
SHA51201ef6d0eac1e0342d5a87979adee05710b82ef31da6dbed58b706d4177cf4c789588e7243f614ab887c6e5bf06d59cab3e0ea094b350380458ad9d01a534b5a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbb3b99e9d42498a82a1d87be7c9a6fd
SHA15ec34d505e98cd9695af5a7065cfc533cd7c86c5
SHA256179afad2154935a8c5163beb4744889bb0be375628f7053ea2b2bfb56b17f11b
SHA512abb073bd25190df0b64d16c09e1a7bd3c58f4d4861abccccd5eca2dbc3eec152cf208c886e5a6ab626c93660d31ae799a5a24fa506d214decc7ecafb4dedaf44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537a418952c05a0a19bdc8a00ec83b866
SHA144bc53dd515ee99e01f48e9ddb8643b36e8d61a4
SHA256b8973d133011257e099a423ab2a7d9ccc69d7b7251465c192aa42052ef0b7c38
SHA5128913b79f6174a1e5f69abcd08084b00ab1b375d8886c363e1f5a3b5da27d42e9f3be994f4ffd06dfd57b552fab783c345be6b4de091b0aa565f886ac18d7ec81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59548cf03ceb2567c33c86251322008d5
SHA1b3111ab2b628ecbe8dd43dcdc764c1aaf49b389b
SHA25668f533c0c8be18f89d328148300970447a8f0501863ba437691cf572d113c553
SHA5127e053ddcad616d3c05426a17e77ae628ed474012c26a1e9da41df4cd5b69e6478800b737b2bcafed24d01690e559728cf6c8a6f457831c54e4d1672b0e65e64e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5239f0fdfef2cd637c30cd1c03256d2cf
SHA1591745a10eee2c9a0d74a40f05595c7ef40a8fb0
SHA256c87d3a6ad0662737e617802e44af2da85e79345da7833db57c64332f779cb308
SHA512676a7cec99c6de2800d0aeda671a0b98f1a84d67d1648c0a534e2b46080c2697419aedc7d65ea4bde589cbb161d2a9de6241f0ae810a6de612bbc16ea29e5930
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb899df576776e23f8374d09a95168af
SHA131a54c0f15fc296573f4bde90290e409bbf7cb03
SHA256fb7e3bfd6649f7954423ce1b7252e1d94130510a38cfd7f9c92ed33b4444459c
SHA512ad5a5a9b521499c07491ca840c1728dd98fad86c854497783ce50b0704065f7875eb68a085ddd8313163bbe30bfc9ac47e0ede17e0f617d4dbd379efe70770b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501ffc974aeee28c441147e15f591448d
SHA189c55a23524d05420f0b6ca87a6f9fd56b32a005
SHA256467506361f0bbafcaedfb76fad728b46cd745ebb1b9dcfadaa0bff95f5eb5281
SHA51241ba6c23500a8f911c06e67e49053c1b83d2a4514ccf0f615a453ff25837e552cab533c18dfe59caaa81ad262948eefad5d07f28718da281b88e9f7e1dc7af64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f264ba878e5dc94518ddc2a1f7d1252
SHA181426dcc6540adad9f2eaff7180afcca99b61b72
SHA256146977b3326b5fe4dd0cedb00960a379e040a96305488087cb606878ca0aab08
SHA51213146cf98cf9ea1d0a9f16fd83844ecbebd9b85811f9bb5e6c0c3d69673f1a31058064769dd73ea7ffde956b5336655072368a46ea5833e4861154df922f185f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5703357a88aa8aa4acd9706f99305f09a
SHA19e361154831b43bd349f4f1f42cec88bf4239766
SHA256b0f33dcb518e655cc2f3c6ac333701fd450970ebbe495e2817add6a1fbda8709
SHA51271c17a03ebaebf396356c8fee9f62f7246c582be82d9499b3d253972ea6827803cc0d87e609b4bfb76b42c4ad7e46c68588104095272679588b2941d4306746a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b