Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 15:14
Static task
static1
Behavioral task
behavioral1
Sample
d693c405315ab19f2bf43f09ccdba8db_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d693c405315ab19f2bf43f09ccdba8db_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d693c405315ab19f2bf43f09ccdba8db_JaffaCakes118.html
-
Size
37KB
-
MD5
d693c405315ab19f2bf43f09ccdba8db
-
SHA1
dc27d45cae79dd535c37fbe6ac414bdf83189310
-
SHA256
7e2b914007e1f2000b648c6d892ff87216b1152d9311049cde9c488c04f3c9d3
-
SHA512
dbc496641b5598378f9500098e15950cc6b72fabdf47cc9c20c052418db916d1363662d2b79eae408034922f103892281cefc5052d9d4cbe086afe5f280cde75
-
SSDEEP
384:+jvHwduTvmBxnxIRLvoKcXXWV+PzCsBSGXNEu0:+jquTv2nxKLgZnWIVB/XNEB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{46403F81-6EBE-11EF-BEB7-46BBF83CD43C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 609e461fcb02db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000000a7e7a563a4b214b959175430e48e00f34c862b9350389cc421e866d84741c55000000000e800000000200002000000063c08325a2557407a4ef8d5349184619b083ef6d8212e0802a27ebd372145cd990000000a37965fc7b1e84403d578149e0523f1c011109cbc9eaac891e5cfac2d5aaa60f318cd7f2f958927f0b685d639d266ab643b423fe08ee559094cd9e39f469d6c8e4845ceb0e7eccefa28a9e2c60658bf65c8ffbd3dececc2a03246cb8011427ff8322f4e98cdcba0be1837d7e45d5fd55d5d145210d112182ede9d6ae6ce93a73d78a0bdf98a647af5f1511a8fb4ae4474000000049d39d7178381b26286416bce1f931d8fbb8cd87748ca97c5dbcb8be0a84ff6bb8ef59800afe965e74cb996032ad61da0fceb233365727b58f4bff765e4cd829 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432056767" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000e550d9cb5d04aa97a4e8771e3c870bea5034889e67ad6654d3cae4b148393933000000000e8000000002000020000000c029a846ab2dc1b3024b32ad3e4b78dc60c897fc2e41a39f5127c2c9d07a8bf0200000007d93884a1d78bbe1ca21c1f27d674da5f58d35129f6fbbacb76d267404cfaf1b40000000a7ea895ed6e73438f99d0cdbc470ffbf713ed56f6d9b3a3c93adcec57897ef6ffd8a2ec9a4f62771c07a01171302a86c1958f8519cf96eba40f926c681c5eacb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2960 iexplore.exe 2960 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2536 2960 iexplore.exe 30 PID 2960 wrote to memory of 2536 2960 iexplore.exe 30 PID 2960 wrote to memory of 2536 2960 iexplore.exe 30 PID 2960 wrote to memory of 2536 2960 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d693c405315ab19f2bf43f09ccdba8db_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2960 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c43365fcb32f20caa0a595cebcd233d6
SHA1cd0e5c5d5163fb0a6139c0f6860433bb3b4f68aa
SHA25677fa0d50740572e40af1545e5ae2e818edc4d0f2350080b05366cc3d6bc29144
SHA512109dd5b9c96c3f726db87462d54ce3fd37a3f170dd867afcc2faf24218499bc48ed11f9d66d8066406aeb1ecf4452d0e10b356adf79e6329bd314394b336627a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56402afadfc817b77e2ec4a53cb5fd5ec
SHA1f4c7be55626bd4e6022313460319d5edaaa202bc
SHA256872de831cef4b934df0488c29c4ce85bee15e8a3a6441c851f2f0d3f479d39e1
SHA5122bffffa0dec2771582d82f73f154db1b689856fed7f5f0a3c93fe1f706d23230a38d4d3eea8be247ed7849d4d57809cfaa3520b28813fc3ebf71924b3ad37acf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e467f1848cab47e000089bf0881bb75
SHA13228eeb662cf205c40e2a41167c1b8bd3dd1f020
SHA2567e016e8b77be9401e0ddb09220f7a6df25aade3fc524e4d4e4126bb7627fcd9a
SHA5129c4b5a9c92e0672901788f7811b551955b734238b2fd9d2a03f84c8c7bf3a45371577bab3a00fcdca76f42714e30791410479720561209043d4b80d8d5028872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d3d7b5ff98008b11011a305f8a72751
SHA1704303c8fba158db8c65a2f2bd2bc31b8351d4bf
SHA2568b9734693196e91050d878e7a5210e9ce63aa7ba4bf9d1a847b011cc25f5be03
SHA51233f16b7f0bcad406773615a62de604880cf02005e7249701a4f68341d70e5f7c210634ef44532de5aaa109efbb7778675b76a14ef325c8f967150e1d3f1789f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5516364d760647b9043f2a46810df95bb
SHA125157a03a01e4653b0365f54bf0aa3a150765787
SHA256c96deee18ba01421f6386c7ba6ddba9de83b9c21522fac9ac51a2246c02ad32d
SHA512ace75defcfdfa8d904d34d2d3afe24f5de9a579fc5245ace78769a4fad56c1befa82caade080a3819836f7b53ca4f18f3f9db866e7fd79a0f11c21f1f991cb80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d693fdee0984afc297a82ab33a9b5e5e
SHA12dee7ff123832e06516924af4772c57481df2724
SHA2565e506aa0b6f0456ec402b6ccb964321c80bae78e92ca7d3beae82077f513062f
SHA5129caceb89bb8584d22acd9d386407d5eb4594dd62abee12ef499b77bd745840de0d96aa0d1e009ebab66047df5ecc78a7e7b4d731c8b6f57e801a94917e5cc061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a529d16d09b507221aa8a440dd939335
SHA1f9b1ad5b9569d3c1878b85ad4a0cb1504121c2ae
SHA256b8f1c153995c9ae93aee6ac9a30112cf227c2a8dbef0e053a69c85cda183f296
SHA512d16ffad59e4600489d7dada70beba52856765b92f0c7e3100ca2477cd17e12f733b7e7b96ca89a868b2be39392a573246600b64548f06f0a3a28c3d5b1472316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba511eb946216a1dfb6e2b537138ab88
SHA168f985350e762197dff56da2ed2f11fa546f82cd
SHA256e89985a3a43d132b8a12c75f79a930bf8327a86187950323e65773e1be585ebb
SHA512bc7872eb22040a6742365009d70cb14dedff4e35659321637197579e43bc81758f9f7ad7441b517679b1b67a9c675cdd51394c5eec42654631b6829b22d02c33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551771081d9039fe8e00c62e805bf9463
SHA1811b96d9f885ca23cfa9a14595a6a54dc4bc5cff
SHA25645b224baffac351037ef1fdcc44783e34702a78b42c32073fb64c6978d0c96f8
SHA51235ee3b1f215a654fd47aa2e62b43c69cddc1370682755c7a42e7384ddbab179c444bf00889150859082a66c290e38351669b32de68d353fcf92992710f867888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59050f544854221d9e2a540f9ea1c97c8
SHA16b888010dbdc7c48ed934da7588b84164786be16
SHA25614383c2d7272bec40999feddc3194a8e4f9df9dcc5e35e28456f150d4a0f2c9b
SHA51201e9d3e91687b36e9649e618fae2020109171ac9f307ca8361aff5a333f061cb519a1ec76afb06d456f5195981e74fb49b9600197e8d018ef35b432a8ecbd76d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577f73c2903a622f1be3a776d3148bbb4
SHA145eefcd5f3bd94552e6041afd85799ad26716045
SHA2568a00c5e60e1585db6043eea753eb6b549f37e320d6fc5f92f38d25443fe21166
SHA51240c0be6304176d762d1ec739fb720f4e740f7361ba77ea358f26a9f12bf0355c6ca7fe90e63198a867594b2258c676f890dc5805e858e51831c1142e3e984e73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501c56b1719817229c5de47b76d80ee43
SHA151d68e4be10daa06e8d41307e507a74e0bafd813
SHA256c2f139dfc0605eea777563af72c79fae542317646f4f7dd4dc0d97924ad296e2
SHA512630c37186514bdab62fd6e870f4abd6933c29dfe434999ab718cb8d294d885ea328d6b4cc726cadc345cf255e8f95dd9bab3a241fd18aabdf72925d6d5976214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a4d1dedb84761fe8de7d52b59a9227f
SHA194aa1d54aa8c70d794027494979046af9d4690fe
SHA256781c2870f82377995f7a1288d6ba2dae160fff698f5a4920820f22db10f08190
SHA51205e8d2f5e508b970503bfe0cd718901e04a3fcdc012c040aad20b15cd5624c30030e490b95008bdfb96aa0e687d0ca13cb50728f8e6e2281111fca10b0a1761f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaa49220e7dec0d52ab43582a4597ecb
SHA1af51c1a44005a69e12161802b99612bb4f2ca221
SHA2561b091fb7e55a7278de0787bbbb9e00b30eaa6043b4811733e2c84dd0b0f72b29
SHA512a3d94fb857f6730ad3ef95bcbe5a042649a3a14b6fec46dc306f07428412fbd0fd87a6d56d7b52c1d4b734e393186bdd02e8dec35be62db1a8385ac1a560b1df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d23ce014448a147847fc6ec9a71d681
SHA109313e69807d9ab1dd5bcfa256a811448efac09c
SHA256e9a46e67fecd54d43a4b335f45f4d779511a539bd6dcad2c3b1845d9f0f276ab
SHA512c4fec84b6a1dc848046aa65371f2f9399cb20f5a75edd6b07d70d9afe17e78b7b53d89da7356762cbae181989d4fd77ef20bf7ff0e0cef3f49e3dbf3b7b14970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fec4307d075f190aaf57acbd230e128
SHA13e87a00d276da8a913677931e75268aa0041585e
SHA25664b66cf355dc6b595a9d5275382fa58a4ad31a272500b03ec46d5da267f3a944
SHA512120187a3a03aafc3e2327376dce2dc35fa01eeeebb60ff711b360c97e449e1cb8a2a86d057f228f4c2438e2e21ab2695b1976921b8f99319520ad91a8b8218ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d031db85ed81e7a1e30e0f79c651ce1
SHA10e7244fdc4da964b38a5ff1a2b5e9d6d1fd97c21
SHA256fa2c5cda2b436acd4fac3b68a8cbcba5ec4bb7f20dbce8b50ca5c836d47afd00
SHA512919e3a8b357183e32d4f016f4b9fbd37d6a25852f62a71982cb204e38357bf2d53e5c0a919388f7c0e3a07830513abaabb51f2c6734c0161e15b305a874ffb7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c3556a8831ad38836849b946c60765d
SHA12876dacbf280653011a954fad5e8bef0adce2003
SHA25680890f2c1ef9759e1b74a807154ad3acffb249d1b387639d6f18d69c6a170fef
SHA5122c09b03a09779b52db9f9a1b187aab6d8579ebe748bc271d88d240b36457dac40280c47d2387a0b352da79ea74c5e2e2c36f1cd5427703eaf7c3d51e1f53f799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a2561c1a3d05e39228b9b81aa193d12
SHA14c23d17cf104cf3932a20815b45c7dc507c6babc
SHA25665d94ac6130439472b8676414ace03cb932e946351fe024abc140476c57ecaf5
SHA512149eeae4877fa8990ec566b0dd1eb4ab9e61e12a7733de9e2d4b2eb23046480e750983e8a80bca8c918e1ecb0d72978bee8f63b79088644d99a7849529d786b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f86441b25d41f6d1e475480df20af9f8
SHA1ce446db0561a0dca39945513b79f3092c8b95ff6
SHA256194a0f8a10381dca6f7e89e8866b52433c32dc5cb7411780e7bb0bec779a7e4e
SHA5127092652a279d11d0624ed1444e62cc55ab83c9d93d60ea7838ab1d99781bd9d5221478b17afd8225fb74168eb1718529cc33e93867cba5e502c19687eed68932
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b