Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 15:54
Static task
static1
Behavioral task
behavioral1
Sample
0b7321044711829c6a3b428969467ff4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0b7321044711829c6a3b428969467ff4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0b7321044711829c6a3b428969467ff4_JaffaCakes118.html
-
Size
57KB
-
MD5
0b7321044711829c6a3b428969467ff4
-
SHA1
448d04c96e5a57163387e23883858a36182e4bb1
-
SHA256
a462669568585f7805c284fe2cb86d70513df3eca907b25360444d73942d1a79
-
SHA512
ea7ccbe9f84c05620933bb4628b82c5df55dbb560d0f9aa97479d5c2f0110172658d0995faf5d20cc1bfad897265bf23da8f469fbb2421e7ffedb5d0a1c33029
-
SSDEEP
1536:gQZBCCOds0IxCnS8qOfyDpSNYi2IHos9o5Zm57EdYczi24/niW/adY5N9aNqLFVh:gk2e0IxaqOfyDpSNYi2IHos9o5Zm57EA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0e95d7de314db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000004e206eba5dad7aabe3fc993a01e7e3bf9df66e646ea4324430707cdfb7e43ce000000000e8000000002000020000000e9ac193caaa7b0bc8039b4f4456bf4c271cbb1398ad7da9442bd004990308dd790000000b3940474be1600b5f2d3b79edbac19cc68813b35905d9d80f7ef18792e2fde5ace0e31915eba98d6375899c46051df95d81900edbfe1212005103b64b273950ef5e2a76769c18ae7a4bd133894097fb9fb3ab6cc4b5a4d5ef265f3d10f3a7c7f842646f04482d3f939db963c2930e5f4def0fef99f3b408fe8203f68bf1ed1709775f03e62377416f1e430b89f7dd90740000000f141200b5eb1db1369022c00def7ee3b69274e70367671a0517d2070f7b82500fc9bae5af634fbd1453d7970b7fd9daa0a5990a0d69da9bfc5163b072558879f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434046355" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A647E931-80D6-11EF-AF9A-46D787DB8171} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000099136ffc9deb40f64335c8178ab35a2adf4c2242a39b4039765872b19e75f266000000000e80000000020000200000008a959265213686373b171874730bc5744ed31bf057d3c1e3eb9395ad2cd22cd3200000009895c7a36ae51ffb687e64c5a4a60374e72441094ce858afb9d8d2c8cf068cb8400000007b0f62b646231523a1b30612196a17bf3c9fa5b936e5e839023c29a7fb8631dfd30c2331291936e16f6ca473c9e919985b04affffa5c6c4e8d0243e64dbb5766 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1972 iexplore.exe 1972 iexplore.exe 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2068 1972 iexplore.exe 30 PID 1972 wrote to memory of 2068 1972 iexplore.exe 30 PID 1972 wrote to memory of 2068 1972 iexplore.exe 30 PID 1972 wrote to memory of 2068 1972 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b7321044711829c6a3b428969467ff4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD580c0f52a4d1bce8d61ca0877c70b7f49
SHA16f7901d9153f40395c8c6d857303ee3d31f17942
SHA2561f8f318470f83ff0fc5f7a9487be283bd16e0c40e2cae9298019f78c62efd14f
SHA512719e04fb7551c6a343e36c99e64b1dd5170817275b28226e23ec463297bddd58a1ac7df55212bbd3d9da2780503b876c43d6300bfa947da2e348694ef25676a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5950d9f6c87f7fa37896cf4e0f2b99172
SHA129ef968e24f13c177bb0d6b1f54c8a0567dc443a
SHA25669630382f0c209299c7df44545ebacf357468f022798730dfa90451c3c2c30c3
SHA512eec874c5524e8b8dcfac8cce9b71ad5b897ea936396ef3db83d1684fbd45de8aa3337f5ac530a396db69f4f3727deaaf53b2f389cb4092d14a5aa18bf17bc596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5713c32045d1718bf550a4b912de7bd22
SHA1a85639adbfc6247fcf8afb1e0d9aadf96226ff12
SHA2562a7f1a32b5b5c81eeb4e17f4dba5b1a0dada2b76f494828584d6434a6ac056a3
SHA512c85495d68923ef3eb7f06af30653e13ab56d1fdfac6857d4a781ebd80559fc5100585543d59cfaf7088818972e7d0d6a5a5d5bd6c17b00247351faefbe227492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d80884523908915cde3ad4995e8e78f7
SHA1f422cec7d31e1f389df74d98497d5831f0c57e75
SHA256a61cf15e7fce5542ea5cf746c465f27bdbd55595e00589c6097a1ed30981c758
SHA51293cdb22bcf934448fe5d7cf98ac5d2d06557dbe65e2a1982a5cb1b691049b7e1f3636f59b10185dab7bb798d7e3aebd4c1c9e9b4cce4cb7bb141928f532fb484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f393e6021d2de3dce0f40c6317609168
SHA1542096b4a7a4eef23b2ac88aea8df8cddd1492d0
SHA256624c74814f9966ebf7ac28507d792f4cb9e27f420e107224c604e05d87ec4649
SHA512775009c12f352b7d160370c7e7804ad8d8195113c7dac8a627fb2b8853b3d3780f586e5e5ea375330030924249ddba94b513471a021c86d4eba627bca4d94f94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0d36413b8f551789dc54cabaf6d8048
SHA1196e05f63d8e6748fc2118aec0f95feffabda905
SHA2563ecbf91c207a9797517d08a229723c7ca757f779974388244c3fca18608e592b
SHA512c0a7ca97888c5849dd9586db301afc2d4766bd158b6b4511172d199589050a19a42200311030779c4433ac09922e9f0e728e0c78ea2f984931f8ab66474c5766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f313e8b706ddfb223d78a0aeb1bb221
SHA12c3d36c3c5a3371703ee916adbe2b4b4e8ead78b
SHA2568d2cc7b6683021093bd0d73d8e3c03c26b3ab6dcd79c57e584a578abc84fc9d5
SHA5124c4629f7805eb6add408eac236998114b31f00be9746865a75e30ba7fb3bd52a3cf6c6c87f0e620d8017027f32419dc7e0df95a3e81de293dff183293893eca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c962549209ce09e81f2b486fe0cdf72c
SHA10470330f247a54fbf36f18b83e0896528cbb159e
SHA256fa5b11879d82726ad4427da7b58d9df196cfc7788a9129bae74fdf1cbf0a947c
SHA512f3323e644f5fbbaf3d9e928dbbbabd705e53db516993dc6c10ab5f146c8fc707d4eb570e2f060ac5246ebc4517c1289eefaa697829f25833e89cf1b588cc8289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55061b0f72eabb7cf6ebd9306e95b6a4f
SHA1af22c0d2163959149edbf9e66e9f2e319b6d958a
SHA256a95c20494e87592107ce027504c292ec6fbf4ec64c350345cd40778a44013e32
SHA512a18d03018e8c28d4dfb646963f216cf2671f0c93fe15d36394976c4820aa283d19c69a0d4eafab715b1cb0d2054ef8be7e7628c9204335b0cb1038f08cc0220e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffd8f40cddb3bc18e80889116fe3a0df
SHA137d39065e9a2c7ca33e70c7d7b0a9afe61130b7b
SHA2569bfaa31aca9e98830df1797ac77aadc4bf55ac4f2e02f623087c5365de7426c4
SHA512e30fee81e8f67e9ff2e6c60dd517aa6e23ff32cf5429f046733a19a2dc6abb2416ff27555013378a47f18b5554720ac0c4c4b0470dc49d4a5fa177293ecca669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e264fc81aa9691f7417e181575e6170
SHA1fdb70b72e87534a870c7a19634dfb8b236c33343
SHA2562806542a65f5f02ebfc74175cce4dc65ff1fc0ad236a03d3bf45018626746a8b
SHA512360bf61f9a4e8f4d14031ac36c0642512b0b5591093725c65287226d60844fc994f42a0a1ce439c2b2b99303bb2e802ea172ee9e8809370b2c18df6c81aa0ef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586a89bbf7260be877211553e2564d0ed
SHA18506b77b54445531cda0e68fa8a626fcaee7b9a1
SHA25615886c33ececd58452bd4650aaf5f071ef1cf259475e26173d84645bd08293b4
SHA512baff5fe221bef0f5fcb0d61e6671484ae7f97d2dbfa34568e140dcb356dd90018cff8666e2fa10d6ce0a7251e371be2c9d3028098b94f0bcd689ea6e149629f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5907daf93fc378732f32d3d679126817a
SHA1f4261475c510dee6b58191a0c8cc288351abb1bb
SHA256c794adbe088f4ef158b5a8960753ff011343cae820a1813370209330742f6139
SHA512cc9a64ae454fa79c452f229a6c90435d006154dae35590638e52cc95f2db75f5ef592f3bd54ebf382ce76bff613156af76bc9f90ae60d5fb6fe4b03f1d6bfa57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c34ae5ffb3a9d79b1de87b5ea5e120a0
SHA1e29bd0af38a42fbba831a618f0e355b72d19daf4
SHA2567af8dfea7cb396497bd0f66e164e25b7d2a0a169cee575200c2ef6a67ccdf3d1
SHA512c8378eeec9219e6e7b912598b64827706980b89c40e34f74b6da3224d5b3873f9b8e2a1e2dd07cfc77d0a311f705592ed3b93df9cf227bfd1f12138f8a146020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dba4da0c2fcfda020c4c492b61ad0dee
SHA14a3607119320984242b178e28af0835943b3ed63
SHA256fd1293b261508c7d93c08a7d973f559f098b59793a526bde9eaeb18cc1fc0774
SHA51264e4aad2ee5bef6ccb30c9f7d2ab656278ab08919a8dc6a17eeac750315ee3955f175a38876fd9407c70f4baf9c7eb97860f6e653f5381cc0261e845472e3766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e49e1a1aab11e99f12e05decc450d364
SHA1dd10300f6614bc2404242d79311e7465b6aa7415
SHA256a115e99e7f687d2100d7aa7268b8285d5349bb6f633edeec7314208aaa2a4a26
SHA512d1292d1ed84f498d67c17e6ecf08dc9c1d077ec28a721755076b3e5d9343ae95764af66d9b2722582546edf591860fefda453614f8fa5e51d0744e761371084a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515c0510350038dbae8a51fe52558b706
SHA172c7142ff72bdfd9ebaa555dce20148915c028b1
SHA2565872d5e41edf5aeec9fb8db78c5f556cdca2ba45248a4c5335641ee411ec71c0
SHA51219bdc9daf52b7c76833505c04256a4a40314f9037ed458349ecd48d09d1e12e7c32df1754d52a6e6ebc544a634f763aea7b65bacdb2e63a8167c46b1e814994a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c0eed4e1745228047ee580c7de65cfff
SHA1e4f585b417a2e52e6f5916e4370443b203e08e05
SHA2565bfe28dff95c3657d736d48ab725ab9f0ac58a6e4af03ee136f078824dcc7862
SHA512cb23801f7ae3fc1c7f642658384ff774fe28eac31b255a167131df0d7674d8d645e27098d65eeaf6b2c2704de14b79eeff9f55ae3eddc51924471004b970c973
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b