Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 22:25
Behavioral task
behavioral1
Sample
0fc0599b614a957b32d7ea5bfe837a55_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0fc0599b614a957b32d7ea5bfe837a55_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0fc0599b614a957b32d7ea5bfe837a55_JaffaCakes118.exe
-
Size
13KB
-
MD5
0fc0599b614a957b32d7ea5bfe837a55
-
SHA1
1ae5a2b6c43f2900c4e853fb7290498c5a84d9a8
-
SHA256
7e03904943101ac6b238beceda337d92ccddba7d3ef825019af3004e516cbfe1
-
SHA512
0aaebceac718d7a4f66718d50b960fa8fab9dafa7c8761fcb47f532dab0537ff8a8c1027a1e38d2f20d36ae06dd45d7eb1ed2a02b6204761a9b695557cc93398
-
SSDEEP
192:E4gbgkAN4SfIKEuHGLUwv7E61dmIFr9ZCspE+TMwrRmK+vhOrkbY:E4uI4TvumX7N1UzeM4mPc
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2156-0-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2156-2-0x0000000000400000-0x0000000000408000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D9F11141-3341-11EF-B2FB-7678A7DAE141} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000af6fd0e75ff3dfc70612d851549c9193bf427e9f317fbd617aa687dc5b91b907000000000e80000000020000200000003e3a959c6a11c7550ee3ea915a66b815d507e7c1999ded737f0543c013f647fd2000000039b41d0dc883d9843ff7b91686949e8ee019408bf34af4dd35e9b613bf1e98554000000085cab1d18b40b41c3cfedd30d193c9aec24537a05add1bb840f5ac40736a63cb2c9de25c176a17171e92dcdf86b6f466cf6b948d25d4fc6c1b082f63eb4eb4aa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425516206" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4028abae4ec7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2376 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2156 0fc0599b614a957b32d7ea5bfe837a55_JaffaCakes118.exe 2376 iexplore.exe 2376 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2376 2156 0fc0599b614a957b32d7ea5bfe837a55_JaffaCakes118.exe 28 PID 2156 wrote to memory of 2376 2156 0fc0599b614a957b32d7ea5bfe837a55_JaffaCakes118.exe 28 PID 2156 wrote to memory of 2376 2156 0fc0599b614a957b32d7ea5bfe837a55_JaffaCakes118.exe 28 PID 2156 wrote to memory of 2376 2156 0fc0599b614a957b32d7ea5bfe837a55_JaffaCakes118.exe 28 PID 2376 wrote to memory of 2732 2376 iexplore.exe 29 PID 2376 wrote to memory of 2732 2376 iexplore.exe 29 PID 2376 wrote to memory of 2732 2376 iexplore.exe 29 PID 2376 wrote to memory of 2732 2376 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fc0599b614a957b32d7ea5bfe837a55_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0fc0599b614a957b32d7ea5bfe837a55_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://ads.eorezo.com/cgi-bin/advert/getads?did=4332⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507c970cc15c173098bfcbb7b2c58d89f
SHA1404d2941a85b0dc36a3715bd091003b6374076f8
SHA2560d5b165113ddc633ae6f3029122e0e577e0283d2857332f45403ee3935edd765
SHA51244570b1a4af7d51876d3e4445443ec2620c48f1ad54cacbf48a622e5c9ace170a592b2e73c8a7a04ff1b825d737b994418045e3e3520643633eac0c7fc6baf85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5542a3765cfba5b4d1986db8afa8baac3
SHA135d5572f5b4b85697bdf15584b7348bfdb6e5610
SHA25688020a411e1df377378a5a7a006e985a6cf2db2bf2677070d4387dfb687968da
SHA51288d60f947f3933ee66f6ea65836e45de9d9a6dd931401e5efd638d2e919505f42f4d0a67c4a3e868996f21da6564c95a86eefe144c55e192c827b3d1c79098a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8db0c6d48eb0e3ac981d45111eb20bf
SHA1ec5bf039110cddf6d8645945ccfb2772cd2fac1f
SHA2560fdc319315ced63d9b674aa25fd0ff20fa5236ec84c2712e5145679a7fbae06a
SHA5124fcc91822e7cb2001c8dc1c7e0ce2f9e1a1b18975d5d90ceb107fa58d9735c7bd4a499a5f448c8496c26e5386e49d418f7ed1946a818aa562004a66772f723fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564cc437fd027409259a789fca941a4f9
SHA137d764c9ce33970ada376f125962366df400d017
SHA256368d1de31b41869ace37e5c6411fa03dd073d6838eeb30dc493e59caedd822f3
SHA51205a3ffce2b615bb4e361bc86d30702225ad12e7cd983edd92ddb8bd7e8c031c45ca084871e019f0e94b1046d2adefe316132b9912a7dff42f8cd52c69e87e566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578cd6c2f5400f53b672e87084648bc9e
SHA18786f7b25bba45760b88fff74e545cfc3668ede1
SHA256fab0ebc35b03a53bf8c7fa290e2f45c7f17d0027006f04b041f887a6e7313523
SHA51252988a704f762f9399fb34b357322c320e73746cc21c8945410647e7a605076113dad4a417c4d3309c461efa158a34aea83599d33bd96a6b72a37a40cdbf1720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d75cb3c45b8252eb4c949a5682638858
SHA18a01765d171d191c14b3067c08fe41e3aa77e5a5
SHA25681573d3d823b8383bcd3782c32d773b4171b993e49317bb864899fe5cf1bdcfd
SHA51299ca7ccd72d8b16caf7f07a0356010e8207dc3f0f50f716c89c01db3d429d9756a59462fb9281ad6d9efe66721c5116ff046340fe17a518fb7325872bfaf9288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a11e6a6addb436cc84180f370c1447df
SHA1e61ca8336c78520f95697085de2efbf673146e10
SHA256bae1b1d599711d27c9feb71ee3d5f99c20fe996423fdff46654c9d005944f0b8
SHA512f1fc0828ba5fcfb69c0b62b96fe8d38b2205c3e257158faaaf80b12b71b271b91fbf1896f9fb4a29ab2a7e06efdd21103217c574ea3f8d843c0c82927d812b66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5121bff597aefc8c3d021212d2d274eba
SHA1dfa9d77f6aa58e6813dacf5a5cc6f2a1f4f89359
SHA256577f112c96de569e74518eef8c1f3d0df19e176b553668779171bd8f3bbe4412
SHA5128d30161ef498da0267bcf3cf8d7251103859236a3034faccd9d5438dba7814714baa913b4dddfe6dd0eebab245793124372bbe55d63d1c7bbc23bd65c81e2f00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537062b4abcacc10011b515fe68e46614
SHA12464f6c072e0791bbbe94d70389ac9995515c247
SHA25686494a42c086b28408f9be3290dd1a293dbefbc299f2140fb2f08171b147d6f9
SHA512612e4f7bfa0428c0e2d2aa17ce11ff28e13edb020293bd4d88720b7e096165587863d15f38e9abd0e23fd887651845e1d96268d182e8033b614ec68e8e7e864f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585d4e7a4e3a1bd98777a2426ec4743e0
SHA16ca807a4f1f7e13ce8cb9dd17ed2dc515cf79607
SHA256f42bc510875db1909ee5f3b21f36fc376537518a3dda7ab833d6d31c9fc28a03
SHA512b74153d2dee8e511b23818be3405df151a0a5c68476bfdc8a412412a23dbdbe65dd7ee8fcf9905d9468f51840fb52b668b4e0f30d945ee56b39bc4cc1d0675e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539f0847cce964fd1c787ad851b92c28b
SHA1268853daba3b3f775f5af7a85f3942b2e879d4df
SHA256a3af3bd05adce0cceae4387dbd580f9c79dd6e9bea696e4ec64af2a9f029145e
SHA512238f957ec92c03b759154f4b5c152680e1fef337dafbea87ed5c61f8b6b0394209731b56d1b379360906f20146161716df1b2c2f528df904e67d72e08d936feb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5b90961c27ddfaa8068e252900109d0
SHA11b4d455ede8daaf4e6a7cdd4de22d6da6be486aa
SHA256d7cf08db4d193567b2a08180e0f3a533b6c9abac3dfa755254477893d830a165
SHA51200118e8e2e0115efed70d9f87c2e9cd12993f3a9721e26af8de6dfe8c952094d8a3f82f6281bd2c7232bbda5d0e81436cb9c700c1d7859e9ed332e490d647a0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558bf6c88bdf674f0dd7acff44eceb52f
SHA1678172810019f634c4a8ad48df61a261dd293803
SHA256c3231bfdb40d6110da562bb4d0629bf6a4e472919a50fb346eed1ee7e425fc48
SHA512e43e3952dffde339cccbffe70ebbdf5ab64d1979cf78daeb621b0814f2971c256ca25db60cb1cb3afee7819b627ad3cbfb3b9adcc9b0e967a006c4c36e1defeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebd01d3e5bd2e419068033c45d3f5e94
SHA1fbbb8e2d181cb3045c32ec2d182256823b40b383
SHA25692aaf286e1ba667c7b2b36d6f4c4bc2ddf4e898388254a448abffd57fba3f3de
SHA512a9eb442679acff5a614453ff4eaeb4b0e09a4a4c786754264c86ed3fb7911f64d683ec4a9e547a36b9685e87cfbfb7a482a6c9f0675509f20b77207c1147c770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e2a15e1a1d245b161291175a46dc4b9
SHA1d4585ebed198b9eb90dd08a759e740e4e73af424
SHA256da6ace50832c93f130b4d9c2f43dc9d6ec9b8f1ea2ea8bb1ec50c3796e94a87a
SHA5121b20a20849fdbfa591eb7ac87bf88e2ef252eb90f75356b09b6510c3e7fa174d93143d90b1162b776404b13f4e583a821b131c6d7a6a0ed72542676e66497e6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5511c1c206280a338c4fbbde0bed4b563
SHA157d8e796ece6e15670f6687bdb65513868a1f727
SHA256b4819aed692385ee8b440a3a56928b36ed99c8d5c605d84f0d0b77203206b8a4
SHA512dadbaa068967c427504762b099180d2b4f1389d4003057ab62042a14e3ad96cfaab911bea8e6df580a836f3e7c9b381ac49bed9ed4fb2461136498641a4b55b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58684e7ff70ba8342a1451a96e062f18f
SHA1584302764c5c8f82937a7bb36bcc5efc4f87bc8a
SHA25691466dfec51ace74de8610d07d406afc299197fe66520be563108101003078b8
SHA5128ca70606e70122b9d095373b4c0bff9d783cd7bc377f01dbae37161ca462b520f230bb2e8848adfc3ce3be9e73e61609ec849ae5dacf821bc16778a467e560f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5326d9f5d851c9c92e4c59f71d866cc45
SHA1b387e07ebff95fb3c5bee78e250d99a52a3c7a70
SHA256f22d53c0d5d7fe8aed86275cb3d91bc987d918a31ce56189eae276a06f210e9f
SHA512f8ec0b710e40c77fa019e0bf2e9d2a70d4d524edbe96c4098bc6994eebe2b5fb973ad21b5407b211a41ff64586c9a787461f3c7dfcf822b037723ec89cf5bab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5667e036510dfe821690d855af189ccb7
SHA157854ec2c68cd0f5749c37a72e516ecf98263d79
SHA256ba598f8240e56d122fd90152ce1a4d1680cedf67a26f5516a94ce410f1581413
SHA512b3af3a46e787b8acdba7de117f7519570d9066e7fc7c2da23c0644bf8fec5a32ae09af6cbb2743066ad2c2db4917bd4cb908b9f7cda4ac7c3f20342dbfb7ba7b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b