Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 00:19
Static task
static1
Behavioral task
behavioral1
Sample
b59cb674bbb26297022c5dc1d21cc2f8_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b59cb674bbb26297022c5dc1d21cc2f8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b59cb674bbb26297022c5dc1d21cc2f8_JaffaCakes118.html
-
Size
8KB
-
MD5
b59cb674bbb26297022c5dc1d21cc2f8
-
SHA1
f6cf2f7c309c690b849cf4384500e31ad0ddea59
-
SHA256
c6043af35c90f65c7d77fdb79ea556a17d3eb930826a37f29c093b9dd9fb6052
-
SHA512
5b36e327afcbdcaa7873165364a39527077e0e3291032756002b3b6d75d08fa650d88455caf56097f87d40410e10765baa7e67103f8d41456c4308d7d0d52f0e
-
SSDEEP
192:eWdx2Ru4FBqsBJoxsSg3M0vbQeDC2yiXtZIp5nGjUYcc7gTTmBaTfZLujbysxR:JsBJ8sSg3dzQeDC6XtZIp5nGjUYcc7S2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30260c3029f4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430447862" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000672fbc0fc7de7f9be9dd0e1a3449877838811ea4ee0deca466aa0bd8a0e840d0000000000e800000000200002000000082a8fca28bb56520a66b493cd040caf107ef14d7ba9c58f0f9ad6ce531e9d98420000000f0611e188ca4e2117365d25c2280fc8a339e8bb5e59e1e37902a291086342370400000008d17d2c99c47e5fadc17ac36ec87e396f426c275e6b8b532cde7a4dd56c9fd45367fb0893bc0652fbdb6ed2a9adfd83cf84b0dadf0baf68f260a7998b49b8fcb iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{41319531-601C-11EF-8D34-5A77BF4D32F0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000e1962f7b208de6feecfb9f5867c6b8011c74908d869bb539e3bc7fba62c0a23a000000000e8000000002000020000000efc33933fdd1a2a591425c456d3d74d18c960a8ae5d4641ef3940a04cb83d377900000003d987503d38770d6d80823e2649cb6958fd8619605aae1033c1a8eb222b16a9f67e3bc259e9c1fd1896c481be0c89c50a7184655f9d90df73cb401de9f4c8cb1d7de956453c5a25c70ba4ecf5afe71a9c33ca54a2cc910b64937a4396a41be2a6fbcfba599386bbb8dc95bf11361f0abf48abaa8ac369c13056577deaa1e6576b29a62060c8e8dafa0220672619ca62f40000000e04b76ad6f2406277ea0e167b01a0e91f2c80c4f24b62c3eb9471437e5b0efe7127a78d5bc78e04f7a68a7401b2bdf1deef22263e9cfb37dc16348f31b53fe00 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2728 iexplore.exe 2728 iexplore.exe 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2956 2728 iexplore.exe 30 PID 2728 wrote to memory of 2956 2728 iexplore.exe 30 PID 2728 wrote to memory of 2956 2728 iexplore.exe 30 PID 2728 wrote to memory of 2956 2728 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b59cb674bbb26297022c5dc1d21cc2f8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2728 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508f37a7e4253c2e963a884416850dd21
SHA14769be2595dcb1c08209e691c2522430fdac5de2
SHA256836bdad633293ac0f73601c34f05742d2ff2bf9e5ce4a2c80f8a6ccd75258f40
SHA5126cb1a527e1e9da71273db7a27d50acdbd1aa7516c482afb2055d3b5cdbe12e2e4d08b4022fbace5e934ce72d46fe432178aed8c0c4d3aca1c9bff47457e5cb6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567fde57b8ca95d0cea62f9a8eaee77d6
SHA1b689d94b50899820acdb4e37b1cc1555de3cb642
SHA256063363591ddce2ce25c405a5136ca8b1a5bb942066904d9afadf9d8860dfd95b
SHA51227fd84c475f6eca0250843b9716a0ec2cffbf018a82b00d9a201df620e7047238253ae51a7999d3bf2d158dee12d0563e8a6ea820133978fcd05de9c5afb0341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae06365a3acdb53d5b17bbbaf96358b4
SHA167336fd21a649625ae0e00af6d19e5bff4264f87
SHA256745e8627c9b60c6bbbc77e96d8ea6ef013519b1fc70b62102b9bcaadefff354c
SHA51299d45451fac2df91a70717979598853032849c442f197093cb1e7160d9670eb55a8e1478fff739a69fb1f7f0fa001a8bd645c9801e0c80f405fa358f4684452b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5356ddf83bc6b06b0d4aeeb28daf354c2
SHA1c0c407711292ac8bff3214c457fcf2d181f7f6fb
SHA25684fe752ea97f805928412f6ebda6c72c6b5ce72952ecffc93b5e0dd87865b7b8
SHA5122de3caed352b98f17a1cb34d0882afdb16a087f96d817ed94bbf9f0c48a765a4ccb79f1ca446eb981b4d179bdf5171527f62055544c6010aabc7161fe2cbada5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d4ccaea03ecb0fd266d50c084dbba2f
SHA1ab52ec15f0e3b6e584482ae7a62dd2ea9a6ab71d
SHA2569e3d22eb5842b1b73d287b1c501bc0ab54196513115b86d76ee21a6eb04215da
SHA51216e125b699d9139bcef47a8a506bea9b18f9b922c22361e198afd1e85e801a17e0b82e361b7bfa4e7408268d446d6753232a7edc36c0f39228fd7a0b83fbc932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2c9d57f12c64a6cbd7f7cc6cc4c241f
SHA19e9b432d10f0de27303a1e523104ff05a77e6007
SHA256a012bda348c33ffdb654d0dd25d4b124ca9281d54ea56e13c72b01cece780c19
SHA512979701849c5d0df341d1df8e944b4c1c074cd620bbee2a8493ddcb7cf1180069d9c558095ede94048e64ff14cbcfcecd49b0555a4df32ce4c558b2b36b321540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547bca9b310a7eeb5cc81bbfc794c7cd7
SHA174ae590740a395c5cffcd626e972e8fe0402ffd2
SHA256030cf94673d0b53617d33b924ac8d8bfded98e922ae04173538d34847a87c898
SHA512d5011d1ff67ed855e9f22960e82c9f3f95afd45df4e00f449d515df886e2030fa31a213b8cd7606667d188a0ec64201da80fc3c90dde6e7e256b286e2c8af902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9f5176e269303d8df41fb7e5bb218af
SHA1b9c09528f5905181d73488cc1260527c33fa143e
SHA256a4afe47dbda5c27817530e870d2f721191d3f64190b872973a1609e87694195c
SHA512a62c9eda34c7cd8a397a7b778629b744cf2b7888429a79ac40541b29a8b1d9791182c6da5176ae3733cfc66c307425249af2bc834b9433378ddad6c5e55dba58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a579a1d0e5b8bae72e36961fe2d23cb
SHA1f2d6aeb9ec2406afefe6dffe82244312c63403c0
SHA256c89de8cc570a6b7e20274bc91de1c6c5442a47dcb877590558162f511d28ac1c
SHA512bb755ddfd93ed603dce7b88e5764258b95dce6d1d36443f74a1ed981cacc958c6888126f55b6ca27bd483e3ba9a498d5fd975be9288c4f36b1ab779ef1ba9786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553e39de963bf0dd504f73adf79d084af
SHA113bd56f1aadfde9c814ca757fd2b56d692ca71c7
SHA256c9a160d71e7e1a7c1a95ae8d9e40eb54630a7454c075bb29291b309dc8118a51
SHA512fc9c646a84d99228b09ef15862ddb05c4c9d55b939ebcefb4ec8a4f2984bd1b9b14e6c4635ce9eedc97fcfc24bc096dbe3f342417bdb7435f5b944234588f5fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c20940ec696dd6c2c825f8423d1be24b
SHA1a10fae2c8e8bd6ed7d45a94b52aa0214b7b87a4d
SHA2561b6e585c4890652c87c7ffd1d2470b324625ec2600570bc33bddb27284c4dff6
SHA512ee0420b68d80638ad851e9b647f8fa1abcaa39edf22ed7bb11ac17988a1d3beb9bde73e5f9f290fefaca1e799bc79c24607c13266fcf1b3563ef2746e1f729e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d838791db2211a7e316390b700c180b
SHA1421f4eb8e40dc291f16c5722675bc03d3314519c
SHA2565809afe1de1615b0be377690376efd95ea29ee3e708abb680003fe6a64f31363
SHA51255b93222cbfaf68243b0de36743b4c647a4acf2ed6c40505b4271bfcca83ced3f57e9e3e389575254513e747a0a58dca436f23cc285e5d1a04c6ce306801daf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0f16fb5e9f1499da143bc360bca5137
SHA1cea360bc182a8983e2b821cc7537ce8dc4c50fc7
SHA256365dc0f55abbea48e2ffe16dfb54915c002feecf6bc151ad5223882f6f8582f4
SHA51293a27bcb9d8d1eee1286c8bc1a036c6b2cf224feb3d085a3bc3e9963a0e4f025458985fd7c451448c32103d59e7643b1955acd2ae92c60ad4f6d9d619dfbe4ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b73f42f5204aa5cbef107e634b3e2189
SHA1e59ded1152f933645999452df6e892c2afd79d4f
SHA2565fe9ed8d2f94bde72b637506fc08b522f17d43e897b5b2721ad8decdadd35c5e
SHA512c0ddd74b90107eeaa9693ba52d4eba9f55e5e18999cebb0fcda7a34476ed9ad5ab4e5a4ccfb02633fca258e968d6ac3cff34a35efaa957cb76d2038812890ce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd42f45d254a58b9a9d53ae99b0343c1
SHA1438e32cc1865516a103149db68cc3158d888cb22
SHA256d1e4efd0cb542521c63a1dc13e6cfd2ed2ceef1fae7edc89a53a0efbf8a013ee
SHA51201eb5824d9c89d6a8df5c0f597f40677a7c3a3beb48d1a52bf1fbde1e3cb81b52b552d5c3fb19deb41071d2f0f063c7b4992c063465462cf952f5d3d8c56db6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c6b0a429715a9cc75a6c02174f78348
SHA14cb1fd24636812adef6bc8a4419caa5d9ff02d83
SHA2566882584f61de0445ca31733ba03dac4ca7050a6316c68712e1c3720fe793385a
SHA5125add7a855084fbf4a5a2dd852cf1cbba2ab43fb029dc679a1dafcc8bf1412a2bf35b913245e641742a870360d367d677975c80ae7743c8525de05095ffa6bfda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d809c2a2829246b6de3f1ded1a51312e
SHA17ab85222b3b2f244752a60685abd06716845b67b
SHA2565042428f2dec0bc9d9d3113e0149ad81aea43caed84cc7481efe807c251d1434
SHA512dc1b1efc610aa5eed9fb3786c2255ce30ef79a265ab54c40c1b76b026e2626abf853caf7f234b6261265d3a8322bea579333de7f4472fbe946c75abb20225380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58002e2524f4fa4a2e5ec671d7aa865ec
SHA14203cd1cabcc25c38fb8c96064e2a9448165a1f2
SHA25669c8a0484197b371336361ca18fb652a703ae48bd526921014abd96787afff60
SHA51287b03bd5f2dc6305bee73bd54db2f899a8c898a2af87797e23347261f04876ffbb35c422dfce8a318353c8d07afbed3b6161dffa67d006cda3db39461228a533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e62641bb8c2d02c09437ae1aa9092fb0
SHA101ab58525c6200539ea4622d3be6daa9ad3aa852
SHA256346b9abe9b1451e56183a942b87d6bd1570d2a5573c03e0ec4aadca0ddcdfe06
SHA5127ba3f89ca91fd9448a519fa4060621fa23829269c8ba1aed435624bd8fa760fd27c2f8e9e405ceb75feca3b23d6f884a8c41152b3187323532d709c0dc0dcc0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b655dbfd1af95d2874e02dec3f700b5a
SHA1fd394153d70dc28bd6c110957cb8a0abe30e1556
SHA25633449f739b2c9e52c5717541aa93251e6776ea28d4892a50540deb580cdf6891
SHA5126509d87e50f65875c2057c69fc38c7300d70dd81b5e091925571d6aa37eb7a3f67cae471b0c350b55beaf2868027518f719f8c05631774d5d212fe8eacea17c8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b