Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 09:46
Static task
static1
Behavioral task
behavioral1
Sample
2eef68455dcb6f95579e2c4458592354_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2eef68455dcb6f95579e2c4458592354_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2eef68455dcb6f95579e2c4458592354_JaffaCakes118.html
-
Size
3KB
-
MD5
2eef68455dcb6f95579e2c4458592354
-
SHA1
5f9c05a9d909650186357f304ef464e9bd884902
-
SHA256
aab41369bd3ec0932bc13fd1685b7da3308c08a24b6c6ba923060589837e9868
-
SHA512
7d521e8c57935e4b11d8538ea770144f30fa896715066ebaacbf3e9b6261a674fe500f3723cad4f0da48355d8b6f45933897a83d8859fb2dadc671b026284bce
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0026232f9a1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b50504a91a8ab40b0e6b9959b0e5845000000000200000000001066000000010000200000004c3620b7e29ae46bfff843f70c64b41efafd85873ebbfb26d9d3c3851d1c17a8000000000e80000000020000200000000616d56afb014799236567354122c02f96c4c01720abc3b7a43fec4400147b579000000004db2cc8dca743266bbade55d1612a04e4af571a512daf7817726693a13c10e8ea9168cd54d9cda146ea1d2687e8616f23ad35b6e378faac290a768dcc7b185afa49dcc8a01f9e5f4e040b0909753a5cf8cb7e38bf1b612028072eb1f829956721d8e1fedc6b9f3235c166b8be87ab5fb42baa2c83a2f829771ee130036c5f66b55cd80ddf87d4a52c3611fc0547aea1400000009539d3b2ae46f7e796103c73603910ce73bee9e433d4656029d7dca6ade644e891deaf30488cb119b4d7f3ce9ff86835d78f0479bbff7378e096577f15daedd6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57D64E61-868D-11EF-8705-5AE8573B0ABD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b50504a91a8ab40b0e6b9959b0e58450000000002000000000010660000000100002000000061efcef9a8c90d2fdcad4640ffd3887ada9709411f05f73db6603079b859e42b000000000e8000000002000020000000ff76feffd7d1cbfc7141c510d76c11ff07118796d61b40075a1634472b0e9a1b200000001d3d58a8c1e2d3abc1c18ff778495a4849a2640bef6a1b9798dbf7d594bf8458400000007fcaa79a3171db80f2e68f9e63d3a77ebb3ccee2974daf0edf5295fcbb2a105947c9c28485235581c62d538de4621ad7afa5233bf32884d8c638a21e93a7cd92 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434674577" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2624 iexplore.exe 2624 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2776 2624 iexplore.exe 30 PID 2624 wrote to memory of 2776 2624 iexplore.exe 30 PID 2624 wrote to memory of 2776 2624 iexplore.exe 30 PID 2624 wrote to memory of 2776 2624 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2eef68455dcb6f95579e2c4458592354_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2624 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562ddb0ed9958967a621f44289be4a910
SHA19ac5dbfefd65fe99573fb7f69a7208130318fe01
SHA256ae10887d7b2ae43f54c19459ec6edac079b460cd6d7ce149b5cefa9759186408
SHA5127fefdffbdb273744492d6046cd70bf7ec72ca1557b40ff8b9f06f48c625df3e28b17680dbeed366912d311515a8a399de1640d9f8bd2e36e9d250d524c5c2501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5179fd9e86428edf3d75780681d64884b
SHA1cbf4826a57f57d772e0f5f2bfd4f29d0a856fb82
SHA2560499acb98efe2b037fa252e7f6e62bc5556eff7a2e7e99dc0e0aeb8e1b69e859
SHA512543c773ddf5c6709d1e3495107906d09175f15f7aa6ac6163bfa82381fc39cef3a81eade271bcc671a16269c33076f5cc9adfb5629975b700e302ace69592a98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5656c3238334b8c0d5548a4d386ae5628
SHA143527eba2607d8697cd44c502a9528c441d24fb0
SHA25637d7ec4005a3209eba66e39a838c7ff176495f47de6ec05005e217d167ce4247
SHA512b6dfaa615c26cf4c31d34c2ad38702bc80a0cb98db3f0fd3e0413a1f94a5c2ff26db491075f96682a29da21647e84ba7b05501722d3a4d711068f07a2f1f24c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1fde1cb557f11a9deb71d8a8066438e
SHA1411880d57120a1f7f4aaeaeeb660b753f514f44b
SHA2567abb1a3d8a43d966f58e2a7bd43fc6fe481a910057ebf16bc3c8327fda4d7fa7
SHA51242597e9dc3967761991293da3afdffb4e7a7fc9be03ea9750aeadd5e733710bb9b053e47137fb61714fb43a6a57e795ea74ba82e56bf795800766cecabb8119f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3e81e5de64ceddd31b937e45e3e490d
SHA1e17d3f7c6108407a5ba88424e3d5d8e7375462d2
SHA2565b353e34aafc4bb074d4f8de157169fafae9b917d3492a6aab1d8d779c4bf205
SHA512dfefa477ef5492cea1e58096743e9ee2005c440d1f5a242717bef5695b2711ed7739abebf332c71e369273e70edfb259605f7355bf4946c4dfcf047e68e48393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50502fc20e32e8791de700c73443d14e1
SHA1d4375ef10336ecc388df4ecad057e5c250dea09c
SHA256e94ede2b732ee7dd114f34876685c137babe5f29c330465d9ba914732544222a
SHA5126f31c310cfdbfaa576fd9ff1135b98cd96f4b1659bf5ef2e290b50fc387315beb02618d8d9dfa8886944b3af36292b314b3cdd10755c2132af9b66ebb96112e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502c93dd5add8fca116d2b341cb7632e6
SHA11e1727e0a63b7852bb6b6bd2abc31f37346ecf71
SHA2569d30b0cd1734a575886aa78c7c4631671cc5c2e7f24db7856e1609eb15de108d
SHA512aa44584aa6232f020fe30a6a98f10b5e8df187a1a2973d7550fe52e0f2322c0e4e7d4a09cb5a78a88391ba4339b85b256551cdb807099792d15d069538faa2a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8160e454a868ce0179ad60e7760daa1
SHA105c82f34d7830e20f55add6f342215bb85290fc2
SHA2567dac3f2a220a1a5d1ba35c82b0bc001af330992b0c2ab7be55a36df40a679c8f
SHA512e6230ff166a9343a25b4c478f5aca1db588e1f4e9a14bd3c32ca4341886d50496c44df55f3cffaf62f6fee6dd68275193c1c7220fe9da2a98378f26f5598e89e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ebeb57f42de5ff377445d5592ba7a52
SHA1da07de8d3c8cad041a7414c80281bb68287bd5a3
SHA256ea641b6960a54f87e496deb5cc4c489d9e290602b0cfe277b3a186631744b777
SHA51235ead17488df6a8d046cb6a595db963e92785a62a9e34dac03d1be80435d44e345ea840794186b8dfc327ccff27522f3381a8f8755a07c778a3b351a95cb2e44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba16c1f927c9822559ffef4518ff7041
SHA156db257dbbdae48fb4c43cfcde6b8e8fc6662b74
SHA256e690fff80da4e0a945001cecec312b1ed517838659e8524e7e809a517b9a1bd0
SHA5122c583243e26b8414688bdfb973c16182bea6042612d133451905895c8ffacfefde7f291a243f0cc12fda960afceeb61b7b9ce556534d47813eb576ba40381b66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c419114dbba519de154660c7e970459a
SHA17d89befea743eeb33b38b7b3201ec96d0fb88038
SHA2565737d9ead20c63664425ba126951028ee5e454a88e8947433ce0c49a3dd4d2df
SHA512b7e056a82289fc46662ad523e6cd84039ba1a35c9f49c7becef589337f7047d8df2a7b2ed0ce68986f8ceacb6774a0a8c215e950369bcbc333a3e14b9d5cbedf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560d573e218ff73fe3379685c8fcf1774
SHA1b0527162817d5c8d60ec9fd654a8edaa79943afa
SHA256da36677bbf3118da76e1f0ecfd0d5cafe7f28cf6bae1c92cdb76c5b03e68b091
SHA512d91253d591030585ccb8b89bab6323d8cdcb18979c8d35f9fd69a6a7d64d8ad9e8f1990c580ebffadf74d797deecdc4375f7dfe76971745ff67d76146069cc4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528610394c5450f7de66fab75b608ce0e
SHA14e4e82f57cfce83502f7d9f7e8e94fa2dd78bc61
SHA256b0f64e67964f6e41adb49001a2d0faee61c4a11421b29575c2abd8c8c58b9b60
SHA512f3ee2615cb9b4307c7bdcdae1ce88a008f6bcc433ce66b3eb3af076fb58dd44473f0528808ec78de713c686958e97edd77b89ec0b3aa1dec2c2c2b1f4c83265f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577f8c5e470437ca6f8b7f6205acef55c
SHA179c70d6f6df2eb632e55c609e2c3b99a8bcd41a0
SHA256d1a35b1931c2aeee1d4a6cd54f0537d871d7beb5b296f888634d0809f5a4f0ad
SHA5123fe71b6688869052e14ffca9c6aa93b97e4500b27d2d4d8d889e97eac796504642fceba09c6964999f9a2b5f593b207f3af31f58655c747f3295a4fa1b75abb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5464145d949dd04e3e7f1dab53f7582cb
SHA16d0d1d8fe191fa31c063c3795bf47f275234c42d
SHA25670b64353857ec6131023dd1b18b6d593e9e084dd80ef2ffe99328ea7aea80cf6
SHA512f5950735858e080ccba057c251f19e5aee983a1039066bdf8c4ad4ca08f2ff36ccbeff82bd0b2f0133767c70adbdfcf0960e8214e32784b809ace009764b30a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c78272d8318d1f7118ad1337cb749a7e
SHA156b516161bd3bd62e299123cdeb476e75ea9de25
SHA256a0d9eb65c528bd2f20ed71b237fc5d7b06fbf448927cc79f7b445bc15b3dcda2
SHA512c7af0667eee174d10a7f8092442b74532773f8a572dcd627f090f55c46a338f7cc9cb86eeedbbaddd15946f9855fb3e432f87013112de8e9e20126178e02f590
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551be72ec9e6df2e844faf078db874a9d
SHA17473e81e64546cd0ad046557018f3f45b5d69431
SHA256ad653aad8f67b633225baa30ddb066840efce60ae85c0c9c00e5a500c7041513
SHA51270e106d0ee813f6ec2f406284f97f9602da56f227b306b7f8ab0a959aa9bf59cd9d82d423d53f036b8b0337830637e97fae3a1d9e2e11c9085dd44e4329efbed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df7ea98e43251c9edab2b579fc34b22e
SHA1ae8cc88ff6fa3d55312d4b6011ffdd3560299b49
SHA2564d35eb6e6c7124ae67474c3f6a1dab18360f4b8790b06698e3b7db71f3e4d5cb
SHA51275331fc9ccc716265861115891b553d60aa29e25c6a6123cf0e197ccb8bcc2797880173760c7c3e27ed9f8037dab48829ace50b5f47e7b15a2cea40e5c79506c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9ebf507022e0e8f11b7750642e68f19
SHA1677e1688d9dae9c197ef2868a55277965a16fbeb
SHA25610fff17a74ca9bfa3d54af00731b28428ad72c3173e86675754713a6b8cc0a2a
SHA5125f5492eefe1e9967c8854634660d6870ad2e2dc9a250d6b155189d17c522dd94c9dbb6f375615990d28389b8771755253d3123cd575a0ecfc11f68cfe7e9b3ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fa7847e505eb4ff889895bfc9922029
SHA162ad9b1ae8288d86e5828987ce2279789bc774d5
SHA25636ad242ed53850c68fdd1a1b7d3ba1cdab36e639d45077374487fe9e95d8e6ef
SHA512f21bffcde0912a962330162c57f1ba055d0cacb5c1e2f74b8fdae2e189a0165adb417258aa67da922075ce32abe2f0b0287b747c9acbcb39d2ed6a7c70479905
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b