Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 13:28
Static task
static1
Behavioral task
behavioral1
Sample
5238586c5cb6fc8984daba97f427ec0a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5238586c5cb6fc8984daba97f427ec0a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5238586c5cb6fc8984daba97f427ec0a_JaffaCakes118.html
-
Size
3KB
-
MD5
5238586c5cb6fc8984daba97f427ec0a
-
SHA1
3779a0c824c9eff9a1845b2754c5447e348e3ecf
-
SHA256
bbf41438f3d1140993a325092632969b7f8689174347b2904ee6bb48bca634f4
-
SHA512
67686b8c3c625d59fe26d70baf8ee637e9f57dcb0d9a433d7100bba0a8860397f9f92bb47d1e2a48197ce551e637c0c2bb093d6eb7e4e1af2c8e8eabd8b0a01c
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000042e65113f0a9b332fda296e04bf12c048fe2623fc1f88a135633af5392dc592f000000000e800000000200002000000063a50aba2c9ddd4ac8bb4ad5065b379f41256832293e0b0f2a59be17666c521b900000007c965f8041c4e198b654508609b43261ea56492c24a4269daf4f4b748d43741ef1d2252fea492c157eb4758850a23ae167f796492700da8bcde66f93d0718c64c7704f1262fdc883682fe01881114eb53190ae79e3120a273891666e945d83a694109547afc8979cd79c244b8c4564119df23133367ec380c35e94b7de5852ec49f769056084fbd1050109f2e97667564000000040a04b83139be5da58a901fd80a35e932555f27e4680bc0f84028c782b2f744c1d6e96ba6ba520e2d77e2532c3590a14efa9308a8e4760e4097461cc7bd4360e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 500e90859820db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435333570" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000657b06e13536cafbb09372a5aa7841e2da48483bbaa8da03e51d0668d9ac7d33000000000e80000000020000200000000dcc5fa9a37c818536a15d8462b0b2e442ddf431c9b08eebeca0f56e705ad14220000000e0a70ecb7a832897504eeb67d9f28182c32100c0648412fe15b7ac88e8817c1d4000000095eac2e3255b6a81fe204c10d5d4b968dd586722117e803e0a0187d680020b9124348e668834216755cf2586a2e224163707e5c7223ea6a8dce73a41c9f4c8d7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AEC7E771-8C8B-11EF-8B3A-FE6EB537C9A6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2328 iexplore.exe 2328 iexplore.exe 1484 IEXPLORE.EXE 1484 IEXPLORE.EXE 1484 IEXPLORE.EXE 1484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 1484 2328 iexplore.exe 31 PID 2328 wrote to memory of 1484 2328 iexplore.exe 31 PID 2328 wrote to memory of 1484 2328 iexplore.exe 31 PID 2328 wrote to memory of 1484 2328 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5238586c5cb6fc8984daba97f427ec0a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e13796ff2997c86991f26ef12fa6a12
SHA1a12c4d3de1720bca70663262fc5e5d477eb54b36
SHA256420079d8f81046f3e64cbbac1e77148cb0c95b2e46e589268f85e240027919b1
SHA51237f8d33a524019331bd9ac7040fb5a8fb980a46421238df94f529386b4542004d03f05fcc4a32858c4eaa37116629073a63a1b6ebf3009b51e441c61ac904d23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c425e5a752f41964431190c8720938e6
SHA16e0afdfd96889cc62a1f020224f1d3d0f386a118
SHA2560682c98390690e88a136a241f0479a3205d97474f55ec0bbd3b3c32deead14f0
SHA51223b663cefda83054a4bdc1e0eae11f448ce17198d133a84c886b02571b84a07db612d9d82970500bddf05ac1ec3fb0890adcf9e727712731520daa22e56fb918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d13603a74c714f8355addbdc445dbfa1
SHA1d8aacf375e37b5d929c29e115c052f1a505f2b09
SHA2568e29a83aff9aeed5cff0b9c4e7e911e14b6d0eca3a3ca259f584ba449c6708f9
SHA5124ff1bcebb52c2669c8dfa68dd5ebf4d65b9b8f457aefc829b137256c8b39821b57f57bedb4623d346ad9ff15cbe7da401fb0ec47aaed4e5654b869f5aa702ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50939b999532692846c8bbb8c60f2f88b
SHA190213cbae57f3fd81bf827fb64b0a3cfab1afd85
SHA256f6a521786f0dcd72302903065c435aa3a4a1682d83e99584292f67bbbd39f27a
SHA512ee6e58f1d2f37813b47e7d35ffd275e6be260f5a6b1f2e5ea45c4f94acfd8a6131b3f92046f3f30fd8aedc315a531c72fad7b5db75fd8f31e754ce26e178c8c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560cbef5f62abf3e273ca00fe643d1d47
SHA1c7adcfe067947684abe3714baf9bbc23a57b1878
SHA2563e385230a6941c0ad6c2f7bec64528e0ea4e81f8958681ef3f253d8b8cc2aa44
SHA512971fe71584728465c6f7e73a475ac651e48de0715b3d188a4eb9f7d12b2e26b8623757b7059fca515bb4d58bdcc12ba98829f1970e0dc167f4897b13a16d3877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c22277e5708f5b90bf4a137e3cf54314
SHA19821fd328ba8c6eb19248e90da90b99f3f1a8e70
SHA256e8542b4bc4615f5e8badf699be66c11475cc37618850cf25ede4d55fa6c251a6
SHA512516ad93aeabd0ea5c27865d07d22c4f06c123299a5fd946ae582025af0645299d675911bc44c3ac4a4fa6f8c5df5ec41140250ab065db5e137073e6aa18f1e5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b919f36fdc9cf37da7e8c4e72b03cec
SHA19bff442c713fa3fbb8f60ccaf52775fe6571583a
SHA256c0375a4d848edb5a51f58d3192e801c83eafd91b11a52398d470e69127c36130
SHA512971475f055c461a265b00a6f83a298256d39dde386dbcd0b3b46aa967cadc857bbd0dcae156cd9793cc554fe4e680b3d1f159e53e16f5e6bedf2206f3936f5b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5601c04c8639533b9ab97e172a7495869
SHA14cba79b835eb93097499dcfb64c6f1fc58623d05
SHA256979a612f093982c742331bfb4996b08b6dc453d3f5650e48cfe96e819882b85f
SHA512603d2567ffd567490495f453d6c918816136538e9adb26a2673e182d262c7d35c4bd7b592cf64a8f5ab06ccf2d32c3be86129fd95faef3b6e3fa2648b3ab6744
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cfcc68496e654fb8e62ad64840a686a
SHA192a5cacf604b52a6c6180cbc0af35a4965503895
SHA256f1ad595b6ea51856b9405d27c79ff9ff4361475145453ebb3f2ce9978dd48ea4
SHA5120f4e9e16446cbeded1b1dba6b08c2424357162a4a6b41e33b3cba000a0963df7d4db912d741e4d73fba67f19f060336f65509e7e9fafd766ef7f519e5b74a55a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541e082050a09a5f2b3ea0c9dc7d5c2da
SHA157145a7a475a9997df04d3a72d900237525c8a80
SHA25668b687e08c0e2988aa19de55bc3189e2e72a488a38548157068b145ee93bc2f0
SHA5129742e1da24ae78424e93bf589a53c201196e5e55ab22c5aa45a2a6de202486f7a2b04f5ca59a9ea8110d5f679d548db1277128266e6455f423b12b6a50cf6ec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d70c18484833d7415ae54f3d6f743c76
SHA1addf79d504e573298eb7f0e9190eba15c42ef1e6
SHA256d88e9d81788f7f3e93901257c5cec55fbab9ab74275bc6803f851d2f9c9d27a9
SHA5123a7a6fcb6389d0b06c099197731dbda6f3b3ce95b65534fb68be30bf1122ab1f4893dcc3beb581adb39e0b5d1795383756c158d710a7895b35a6ea318de74ed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd29f6d42f8f757069eaca39ac8e3dfe
SHA1dc64c5d45ae19f8a9cf4a7416b8c319b9d88d37a
SHA256175ffeb96f1b2dae271c50e02a96f789c59e2d9ebc27691e4bad691428403256
SHA51282b4018dbd79470894b9e33e4c6b5e3ca810ddd91a2f2d4ce74c5e24dd3ca10911ac463aec5f718b5a67c3a1841b67f29b91503081ce3e6fd3901459ff4c4b1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca18d9239c9c2fe3ecdd602d94bc1a93
SHA1dd4a0702b3ef49d63ed01f9ccba9413fc3b06098
SHA25602f3bc542bab6d88b12b919d12369016408fca87a74cbe93cc3374384b487514
SHA5128e59b56473e37438bdd0f1d92cd5bd0b0611708813d2f66181243341878f9b346dbfe6363b7d074853184f140089d8db1efd329de2a1fecd34b9a7e1559459ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9665f7974c453f13f603ca14645eb7b
SHA1bfd9b13a904eff1529f96ec9a824487b6e3bafdb
SHA256cf27a67c81cefae375bdab123441a12bbc90ecbeebd9a6c4fe9387a03fb7e27d
SHA512c27ff80482414d632325353d3eec6a3d3ee75cfb8c63e45ab14700481a43dc56ec442e4cbc35fc1780153144149d5be75a78a49a4e83f2abbc5e434719f46d21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc3d322a76cde8fa4afa08483bfa5cd5
SHA1aff38115a47679b607948a85031e5194216b81e7
SHA2567cc321edac6fde7437be69f07694a00d2340a00ae8d96e22dcb30df91c3ffc27
SHA51296dad3c79360acfd083406b2904c471dc76c9eb48326a283573c12af249f24b89e29ae657d86dfaaf763706c6c002f47ea5cfbadde936d8f89cb8ebf9d371884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6a75b1d3a6d7f33a9d84e4d870d0e0e
SHA1e1413ea10011d4e8defe50ef6c668160f7ea5e88
SHA256141cc73c8427ad67405958ae6f86226a84d2a8c7e7044392bb9afe5822274b97
SHA512275966e27b67683014dd24533cbd7c24ba0c7066d2324386c394e97e583d491f2e68bfd947c4506c872681ecfa1d095e169436a3318f5e418b032a125cc59330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532262fe438662ad71fd15ff4c3fccb01
SHA1de4f46f7e7ee25eaf4fe51207bd5b209601af478
SHA256b1a691b6dfdc39ce00efcb4e6a092edc0d21776e8cbc8e684c19cb21f33cc85f
SHA5126fb5141cd5a452215aacf12153e34a39cf5e07e3bbe6784d62458817428dfc92afcb66046cb495d5fbfe05b2ff7ea13a752fa9a23c9e51cd90b1894a5b0f104c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6682c694076e57706ac31be82c8d15c
SHA155c11648064bedda37872433300540bb19422a9e
SHA25619b3e945136c771e09263600f230a30007e4911dbc3092eca678b1d14f443a39
SHA5120bb131739204f5b9a435991e70ee22d88882a0c6fd55892bf9bd4b1e29d2c5d2d377372e11778fccdee27c77aff863691e19ce740e02526deacc18432f73be46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c2023f3f56da97783cb35a8e57d1672
SHA1b4d2d89cfb1f375bb445148fa49110b373ac6e11
SHA2562af891a1001c5b348915b0b79d3d9300706dbeb706d4de086705023170c61607
SHA512eabdec40407854f5bf4a8a26bd66922aba7813e9382844ac34d1ec06bbfd23e98ce3d76276b866171a073e2598e70420e96202cf55ca5c684d0317c7660bbf29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aabd0f11021e6a87f15e0d3d68c3386e
SHA1cc75535e322f292119d6921a4da481f35adf63f1
SHA2562b9209f16a44e1719011b39911099adeeb7b52142b7fb97384b581157cd9eba7
SHA5120f83ea76f7be154e21d1b3803ff56318f3ed7529de2c282dede77cdbaa95acf26ac3cd1f84fbd0715b52a1f319c305cbfa941e72e08a0104d6bbd3e117c8ff0e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b