Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 04:07
Static task
static1
Behavioral task
behavioral1
Sample
82f8a4d0c9bd3d8f70979fe506aba2a9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
82f8a4d0c9bd3d8f70979fe506aba2a9_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
82f8a4d0c9bd3d8f70979fe506aba2a9_JaffaCakes118.exe
-
Size
798KB
-
MD5
82f8a4d0c9bd3d8f70979fe506aba2a9
-
SHA1
306982e9b37726b56ed639287c6015d11b70f5b9
-
SHA256
cee39d68c9f3c3e7495dd9fcc3757593dc9b23dcc1ab1a86f950b0a5bbbe5c51
-
SHA512
bd0fbb323188b211af957f33f92a917c10085bf4eb6134f3cacfd31b4c24734c2e05f3c6fc23f6bfc98c4d385c0acd66a267b7ccf3a459ffa14d0e2754ff10e3
-
SSDEEP
24576:JUWqistD2M4gaIySmDABwQza9la2kfq1D8RcQH:JUUu4tYBwm0bkMgc8
Malware Config
Signatures
-
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\WINDOWS\SysWOW64\380205_298670926878825_100002077619208_674238_1164827154_n.GIF 82f8a4d0c9bd3d8f70979fe506aba2a9_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\تحت الانشآء.exe 82f8a4d0c9bd3d8f70979fe506aba2a9_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\تحت الانشآء.exe 82f8a4d0c9bd3d8f70979fe506aba2a9_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\__tmp_rar_sfx_access_check_259440348 82f8a4d0c9bd3d8f70979fe506aba2a9_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\380205_298670926878825_100002077619208_674238_1164827154_n.GIF 82f8a4d0c9bd3d8f70979fe506aba2a9_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82f8a4d0c9bd3d8f70979fe506aba2a9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B92A8F31-5084-11EF-9988-DE81EF03C4D2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428733512" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2692 2400 82f8a4d0c9bd3d8f70979fe506aba2a9_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2692 2400 82f8a4d0c9bd3d8f70979fe506aba2a9_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2692 2400 82f8a4d0c9bd3d8f70979fe506aba2a9_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2692 2400 82f8a4d0c9bd3d8f70979fe506aba2a9_JaffaCakes118.exe 30 PID 2692 wrote to memory of 2896 2692 iexplore.exe 31 PID 2692 wrote to memory of 2896 2692 iexplore.exe 31 PID 2692 wrote to memory of 2896 2692 iexplore.exe 31 PID 2692 wrote to memory of 2896 2692 iexplore.exe 31 PID 2692 wrote to memory of 2896 2692 iexplore.exe 31 PID 2692 wrote to memory of 2896 2692 iexplore.exe 31 PID 2692 wrote to memory of 2896 2692 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\82f8a4d0c9bd3d8f70979fe506aba2a9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\82f8a4d0c9bd3d8f70979fe506aba2a9_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\WINDOWS\system32\380205_298670926878825_100002077619208_674238_1164827154_n.gif2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2896
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fb8bf0fe636cd473ae31ecfb65583c0
SHA165431f6c09b39aa32967dcfd766158781444c7a3
SHA256e58655772d5e55531d857c01594025ba0049c4b9ade8850f7f6277956089c170
SHA51237a78b4802c3f6218024a4ac49425d5223e325c76699b2697068d430731e303e2f47a26c000327a110f247d3d0cebf28d60eabbb6ee8e7ea8886e81394a86ade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf76596511f7e38041e5fa861caaa77f
SHA19ded5f00efb83b21e503646e84012e5767a19da8
SHA256b2b57b407c8612f6375d7e2e1ce341c7d423296286c21e38e25ce4d299f9d8cc
SHA512caef2c87f79b7a4a6cdba56eb3b082a3f5d57f408ecae7d2f32e4d6ffb8574f857e5068fa31dce127704a80432019b6c664bb6adb354312ff62e5bb7efee877d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588bf4abca9b0a13e3cf6a5b231ea7476
SHA175d84624288f8dea3859b7695e5b26be57237a58
SHA256c97c27208c7fabf11aee7b1fa9283976d3fbb6fb634c7858d66edf59820e8b63
SHA512f13f03770f2fd9a74e6db0623304b374a765624acc70dd9043a06b59b8c4a31c539602f71b76c2c4ff33ad9d028d8d4a4db5df218de3fbc78a0def2ce106b60a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5688cdb5b15d02d7c1e9903ef7eb504c9
SHA1ef14b585cbef3b83a39ff03e7ff896a5f3f53c95
SHA256159f5e449e41d7a7609e1cfbbe2896d77e8f5f0770b3b5644e7e442ddc0a276a
SHA5122e587d4fa8da801a61c62c84e709759e92b48948db8bfa507d78c19687035149dec6e27b55f9d5eb695d34f2125c07cb6b4b350b8c7c4d35ff13130bbb60631e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5757353a9c248529d456b13c6607dc642
SHA10d9be086c7d8346f860de05cbb120e75e23417a6
SHA256b8561c5cb6006b56356b6b97a79ec66448915ba2df55ee6f2f6bf59d83c59e0d
SHA5129aef018655a260ec6bf10643680c2a6e0829a99c97ff1b6b9eb6124a008b4fd59e24f299df7aa95743c1b891f9e206fb51e65560c6c014e59798ab7af616ccac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5941c7ad7c5f7f8c42e1968fb9593cd92
SHA156f7cf61686335a9a1efd3c889b9a9334bc85e13
SHA256b59c4aa5c0e9f043d2258d75541b43949684da3b94387eb162e8ca5d02d3df67
SHA512b1481ae7da28d16239747926ec992bd8e3d1c460d33711ef38aabc7c4134a3f25ec13895707f8644ffb32e52008935ed37c65d22b2e58deebccbdf9a412df5ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58da814956fcae4a0dba7df9e7748e82b
SHA17661bf4335e80ba0ee5c66aabb7d26123502361a
SHA256e106ef20230f572e15824182fed016e8280ef7a0b6649fd0d8058a765217bf2e
SHA512bb68a93cf30c0131c0d82cb07b65d24915c5e302bf3561ab0bd9efc8bf579c6a5938f349921151ba3af68fd0ed3e49fc2bf96b7fba7631a05a25a1aa6c57dbe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535fbad4347c01c0b4914e8a0b23a2124
SHA1a4623ac5f61f9c6b20c3d25644a860b8e9dba3fe
SHA256634af24aafb7fcd857da7a9271b76348194a21662a3a2336f84dbb7b7822f98b
SHA512fec16b2f174eacbc59236455d72fa67a1a26e3516efe0cd5ccb5f31bfa37fd46cf3d3f821ace158661f22a83f090b030c1fbcea30d83ebe24674eff131d346a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e2430222598895e154664445d68dab7
SHA15ab9a48db3ddf609a4a2a8b04137fb25c7e8da16
SHA2565819dddc5f9067a2da453a46d82bf8769e3b464b7f11591fa4f2bd9125e05e12
SHA512575ca4fa6b7e083ca3c0249e491361d7ad0f2cb4cf891fd5f5b05c398445edd961a0ec024415d903f2653e0ed00dfa9104581068db365614704522fc6cc60c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d6ff14d4267db70cbcfc9c3851fc434
SHA137efb81da46628491b53c73a380f4083b8d22c07
SHA2566adb74e4f4f5cc88a7e53b49007d00817d7b5a577fc8daf954c87f8a298cc128
SHA512ccd1482cf74e50e6a455c40a333af176a650219b0b0afbe227cec3a1431440839fffe1e991efb6db84bf59f5f24f56bd1d9d0bd896a23e8f56eca4f94842138c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcfcf532798cebbe32fe87b58f8a6143
SHA107f5b9e74113797a9d2570c668836024b5376e95
SHA256d6d294e1f33b616d88d6b52bffd1d88f45f701255d6b4e0286e8a15b54f49fcf
SHA5122035a2eb5092d2d6099ce86c975a6a45b3f99df3a3bad413d9d0a34f387103bb12416e1a80a6416bab482642eaaf0fda6a0edd37f8b42373c46ea887af02ccfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b499fa480c8bcbf85df850ffbb11ad1
SHA1669f682874ee63087b8ddf11e4e051bc5e4eb53b
SHA256da7a88bf190cc626a800d19ce67a7cc228151dcdf771f0bbc36ae45a929903a4
SHA5126b081875abd65f7a8b9f440e1c5373278b1b745707cd0b39453f8c0484809f9cf45e09c8c5b819c00bae1aaa1da796f9fc3c70998ca25eed195e687957581720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5752075193eb88567dd58e3e68aef5f9c
SHA19728832b5727f9775126c24e652e94e498fa2d36
SHA2560db8e858034504e162d4083942ceaf92e90bf0d17fa70c31e63f9c79a11bbca3
SHA51229e9b57e5c4d720fe437d0eb96288ac4e7c7f530334475f160df4376087346798a160aa8543df6cad08357f77294d08e4d1594ec9c3263e8d58f3a6717f1536d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb46b97fcee63adc378cf1f68cb260ab
SHA176cf0887973a1da1c4dde792eb7ee279e625da23
SHA2568da7cf641ff66f54e2c2c8bdda82bf91f3d469ce63b065baf89756b017f20bf0
SHA5126e7e333c0e282c08f2f9ae399d52ddb061a90bdd9b36c68f21fa1492ec85cd3abc8c54ceb8bfe14c84c0459bb851b85bde459adbbf422bb2be87be7acff05f0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3301552e9f1106a383d674e4e1dab0b
SHA18f7dc9e6abdd15421e9f72a4d77dfa9461e1977e
SHA256965bf33fa3d781c96ee977117a0f1be3bc2105da85d18b79cd7a4cf3f4215cf0
SHA5128da938be6cc274f33b2cb5e17fbbc9efedf192100275a9ce54512641b6af97dc5b90b291d29a899a98b316baba1db6f5c4f716ee6cd96a44341b2a9cc70bad0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dccba9edd8f281dae8ff5ced77cbcc5c
SHA1c974512d72e5470be2ba05fadc15466b7413079c
SHA25689b2e317737d165121f77a8c0028d2a9cf60eb19fcc6b075d26e73203253d139
SHA512aed0a7202a01a7c5e54a29fa6448e773eb09f7284d85caecbb8287b2cdd2cd282a037cd37c75734535a7555560bcfbf45d8f8c6a127cff3226ead3024729d7b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf6a54c0861927bbdc4c4c0b0125f282
SHA1dec5b4e97254d235862994c520bb7dbddc4ddfe7
SHA256366c7f7b2157b7ede26815368d9d7004fb3d978990cccd184b2f1dcf3ba2f8bd
SHA512d75e2b0fe55e04f3b7db46033739cbc26a09595df5084640716115939738b5035d756fa9096f7e00246f5cd6a3a1103e5e75b2d27a450d31d522d6f69da79bcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b6de1cef6f8d75becf857fffa05ca15
SHA19a6e34559592a1820e5113e3bd0f191a70789744
SHA25631401048d6a6b9d1ef500c8deed3c9c6e465b052fc2594c17440f0c57a549724
SHA51241a99f66239d889e31e41ac1f8ac364bf3874263c33233dcc1696e78a1f9d7f193025ed58aa8d2a881f6c8c429a20639da263cfea654a75ccba6b4b305fb9ac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5286ff3fdf7ed365a63da6175defc73fc
SHA1091afde49787fccfc0d6a9083c391296488399d3
SHA256d0bbc558f4e602e206f5c2e99885d57c2e58c6ef523b9e18e1f08616caeab545
SHA512c11d63c2f47455051a0950bf5864b25aecc3c18f10e21516a04a10df3cf78e943d47dc1eacd1828b09f86a52e192451ef1235d144bcc751a55b322d47df7cfb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589f43c705fbf511de91fc3470dfce881
SHA1abc6fa7e21e947301ee0aaf35499729c387b1fa1
SHA2560836c7a273b09058fed91ed0cb262d56c2fac167a0db1780bd0a02b89f0c8fa5
SHA5122d539721e16c4e40aa1f40b87e32d6ab774b528e57a0182023353953b5ea3aa07cbf788e4eecf9f8718943578b3a8fb3c306a0a2e15b46e5abd763e55c822b48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cb3beb91d54edae85ee960b153a3744
SHA15572bb1e5c7a1346d93b15771379a6ac8ed61651
SHA256a2ceb3ac4009205eb4d19b2e1580cab7911916c8eeece31e679137d7d4c76abb
SHA512508ed3713bb3faef5662148f943e254303d4ee62f46c1871b24bbe8556fac9c73393663f799671d5ff1934b14ba0ca0c99e06b7f589f2e88a5d784aae351719d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b