Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 17:54
Static task
static1
Behavioral task
behavioral1
Sample
c143a4f884fb5daf479942f727960fbf_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c143a4f884fb5daf479942f727960fbf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c143a4f884fb5daf479942f727960fbf_JaffaCakes118.html
-
Size
3KB
-
MD5
c143a4f884fb5daf479942f727960fbf
-
SHA1
58a136f98f744c2c343fcd6a99286c63ff087c44
-
SHA256
4fe7c9ef06e560fe746c457e25b7abedda7e4fe5fa9107f1cb0679bfabb0259c
-
SHA512
5a88fbc8cf6d8f7d40a6e1c23930e3d33a511a67059ca513328fdd21fe3dbc3210876fd341f0deecdf7a936dba1aa5dbb26e3f8574b94d143b0a84b165cc3377
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000f6969cea58548dc544af115e8a3e6c8bdaacfd2ad9bf6a83ae3b4a01409453e8000000000e80000000020000200000009b5dc27234897229dc4fdcd78d5eafb0e80070e93d7b6b701f5a00a45c4b5ed690000000f7cb725c4eab38b6ef8b899a2329fb28b88b71a397e2d6563e2ca5a06bb699136f8d623173d2e7fc496b445fb06af78af98d8585a794f1db1d8f9b2d9fd1ba8637e22b8f77cb60af475ce81581f8ebdaa633dda7139c17f65ffc75d7af3bd325ed2118d6d729b33137ad23cdd8fce89b76dba2c5725b0c7aad65d7ce6e8b843b58dfb5919648aa74bbc041f837efe524400000008a85374bfae8ac405740f4f01f8c8912976b16bf3b2d42fb843d64f963f65e5af2bd212a55e8f9e37b6b3ad0bf0e0e5c80ee57666811b813b47f8da3e91c96e7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 602389da17f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{05BB0F31-630B-11EF-A5E9-FE7389BE724D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430770313" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000f2627b6db04ccfc22b0ebf5547a12e729f72d6b3652414bc44b876b4c6f803e1000000000e8000000002000020000000a426a807c092c59fec7e72e854927d327104c7f60c25e3fa8449950dce8514e3200000008428d436995ed4d5122e421e553f5f23a70d58f46fe8973a3e0e3f6bbd19969940000000654b99fd80cc4d255905bbde51b4f0ae8b424f8601506360056b581127f24f665a2c497e180e4e2f6c81d366c9bacf935202e34f11ce8a88d102ce2d5d41f45a iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2308 iexplore.exe 2308 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2552 2308 iexplore.exe 30 PID 2308 wrote to memory of 2552 2308 iexplore.exe 30 PID 2308 wrote to memory of 2552 2308 iexplore.exe 30 PID 2308 wrote to memory of 2552 2308 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c143a4f884fb5daf479942f727960fbf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59825947c71ad210a6f44300e81cb03f6
SHA18534502a2abf9e4a685de9fc461d93fbb455fb5c
SHA256164977a24b5cb01d14b18a63eea2c2ed038f670c5c2d88501b19c94945abeb3c
SHA5125cb1314f62889d552244bdb31990078ddc0c0cbefb3d4c322161e88b64cfe879571a33068fff7845567e00d57557155c2b0ac5fcd0db4982589b3b546fde5853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574aab67829731c54121d7bc09fddf30c
SHA143c6327e8a4e4153ab7cf9ae9fb75f750014246a
SHA256fcd129caab584cf25e13c6c569d513603a9bba1e44d9a68e1b0b91469eee81e2
SHA512c7ef3667eaaef025e4f011884eea33edb63c05f5d5c92ba04056a15427a008773e591109e879dc84be31ad7a1916a749db3abca6ccbd82fcd5027501f748db4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3e30166456b62aa2418321a447c5387
SHA13faa8c9f8c4936f827287117e02c968705253520
SHA256eb5a6f165e307930cef697db3d6b2d472fc2ec892b0f7987242dd0627e949777
SHA5124a5c73e8242e746925c95c9f67ea22edca7297d9472806d78c13f0a2090d7245635019791747490f23a99901bdb4d43006c0f04867221ee11659319de576401a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7e9423a6dad3bc939eec2a4e6a083f4
SHA151d7a0519d0809c5c53cb0061337f0bc295e5fc4
SHA25601458da83dbf86295996e29c9e60322851ccbdcfb2e5640689ae52c67cfb7aa7
SHA512ede2df1fa194934eeb8015cc698bbae35dfa83389f44e597644d2fb2c23ec3b1b2c504f888d737cc236ba838070518c537694194aa934ea05253f13d606e44c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fe761888c1ad762a07335872c9c7c5c
SHA164800f9cbe8a3d691d83ec38ff44e9f28a71c731
SHA256c7383803ac6666b49ef6ff3b44a01bd3b198fd99a917b880815b640d51d78e34
SHA512326ebc07be070d3caa197b14ab27e97f997b65cd10366e671bf417f0be3abd582148a2fab9957850b434f428aa68336d3e021bbc0741f414d29e0898fb6aa31f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503264c45153fdf42ad42f58113d37db2
SHA1ec6cff7cd910c6223d2f4119442930b979312e43
SHA2561031e70135faab8ab137e7ffe961ffe292b4f3f177537eec093189dc398552c7
SHA5121298688735c20f7f7f34960300d9c7317cf28b63dca3a4444ec0faf7492c7c90f79a7dd81ee3e24f42d113bfaa0507178c7cb0b0eb34c75675ac10027d5b55e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6c33c5ecb3f8001edc4884447f7904a
SHA1b7a81fb15d4ca8901f95b903f9bb284a29cc653a
SHA256f933d2847f82ba29c4a4e01eb3941010ecad2fde95bf907a333cb5474e0e292f
SHA5127bc5eac3ec83e49dec41530873651025d67fbf90c1cb32c5cc15a49a72dc7a46f7adf19013776139c6680134b1d2d295394a646b4d356a91244be82b27e2ec40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b19fc267f5cfbd3d9bd4afc655d66510
SHA1b2074ce174badb6644dc22105a1e65f3cf25cf55
SHA256da0bcc8f91386a5798530c6b1751ce1108398af89b52ef8dd5caf35dc96d7982
SHA5127cf9cddba26b982569c52555d3e2f09a531d10002775313a1b0dac3f522e83bab4dacc2483f55e3e5b4cab031cb3464f973b980b2a24d92402770c8b761e682a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580ef30af122e94b58475f4cf3c5e6a5b
SHA18d56c2c843b260fd599973bfabaf3aefa49cd084
SHA2562bb24ad1a1ef35c159f94ed79377ced3f9127cde76af5af6b60c6dd68c7a57e3
SHA512e8913b6382f71db1da8f48d237dddf51e4ea67a463411e56df2921d9998a38395458aff90773ccc8decc6ded182e3a8a72b7b9c21fd8889c9b8fd395a1953659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ae3abd80cf78fc2d94d9e5c53007941
SHA196aae091cd3291b78d6bf087fd202bf76a027fa1
SHA256198220adc685af8b7cc122348b96d6b8a80f4a7ac9baba373f6380449dfcf99c
SHA512e5e48695e6253e630e8f694a330dab764c29ec04e0b43b67f4323600338be0ae1061c24ddabbf6baff46796ea8e154840b12a984cbdb11df25abae2605640115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523bcdf89459ea6f7ee6110679995c53d
SHA1d8229d335fbbc2283e9923275977aba030f7f17c
SHA25663a99d6c4e759d8d54b57f54e2ac3dd1942182e0dd752966f610dccd03ca5052
SHA512ece26617dca800632b66de47a208b0fa77f1b288e7df888b0c7f3c660a50563513447012f566c8faec31799faa6d8ea829e2273779b78499538caf6a1879eb04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8dc86bac9a0aaa067a4438d39fdf050
SHA11f7b639623c0e5a366fc9541261818a0bb79bb90
SHA2568615107623953477a805c714b58b8313b0a39ccedfd245951f782912943bac69
SHA5120630948578915127e25efc6300a22b81532ccf119fb6aeb89f254104afcc0f6bdd569411bae3444198fe2bbce332225745f051534f9e4f14b9273f456484f9cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59339e5d02a03e2b260d53d029756ec28
SHA1fd8025fa467feb4bdab775c398c9dcff0786ccc7
SHA25686c708490f11229095b2b4dcd52f3f6ebd263b43f6b0bb9e8b4665ef029d56e6
SHA51212b9b2393fc199fa9a3c26e69a7b12f81af0c1d32a3fc96cd4ef3a6b4ded27e86b7bc16bcdd917bb6b3a9f534099dae4e1dc77bec68a19aabe0cd877fe9f00be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f003bd4b4c506b2e41be8f472455aee0
SHA11413d3c9f6717c5fb77208e0fa1c3fd9dd825bc3
SHA256e2041582746f805b77671b62e1f227f0971a5315695ae6b9f99d6edef157dca3
SHA512eb33d8ee6ab593c197c713c5459de94fe7e0bb1905c9f5c8ac3824c05be8d467a2095491a85a6de3e8a4bf91125aba9bdf4e74cb2c3c1a9f5f9fe2559dcbdde8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580957ca9b01a83b4bf8953e12f00ace7
SHA143abe559ea33356a7b5cd25c4cf9036511109fe6
SHA25605fd96e82529f7e8b8e4b22c8395e1ea3bd2868fc999adedde235dada5ac6d78
SHA512120805c2be14080dea5a163529c199e9c9afc96834631564d2560226d796fda7570806751d37a7f239fa55225c12cddd4ebd01f2f3be44255f1020417f202606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c40f1e70d9f27971426bbc3b9e811aa2
SHA1510013c47787a96cac55472ffbb232b3f76a630d
SHA256f86b74c02d67e590c1cf717750b0d295a40ba4bfa0fa3e200b1c0d2c1328f077
SHA5126cb83ad68374ddd8bcc378511d4450e942754afe292b48380f013c97880bfa5cbb286a3b7a32d967aa800b590d685b85c22da69d2f08186e1dc8e4f115d13fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5464150dcb1776bf22aa2adbe08624599
SHA1b776f92a6c2acf6b40b143cc220ac60d8a7925be
SHA2565e49a0031bc9836e60ac2143b62885709105d3596506584200b5ea217cdcaaa3
SHA512e8df951bb05729318e04cf66715603458b3034a4b9dd5254f7b86a9ed8ccd30a547ff3b6eecc27c94102a160a2e28be9411ce75e093919376a86029b9b0cdd94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e053203ea24c3e6efca5144f6f5f5a9c
SHA11a0c960d79ebc242d49b5c5e7d3018500a7bfca2
SHA256fd8e74929b7c4d96630df2a109c860cf3c506004212d2636b1dcc7ddddffd1b3
SHA512a7d358ccc2d6a57b256e2af6a302676437701ee6ef648f1ee8889060e73fe26dbf697d92fb62d010cdfc9481b54d9c4c22df48495b00091746d0e4717a1ac34e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57939736f99fc2eca8cc34ac42237b79d
SHA1ec4ab2b8d65964c42c4d8ed6eeb153b97fc598c0
SHA25639dc082af301bc4907b40148810ebe401833d7f8df123934dc86ee08f452c4ee
SHA512c5242509ab310b200654e4be27165f9135df910f57d3c13517268bd086c4262c4ae11a82bf0cd9df19f677b74eeaa37dffe3a2625cd510b2f04a7153b5386bf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504f043c5779036f42ff1bad37bc7dee5
SHA1bcd202ce700b940d983d0005d546ef10a4a33fc0
SHA256d5e694b6d608bcefe976783bc2694bed71707e6bf70aee8e8d8848181e7ce6f4
SHA512bdfe34494a47836d9b4f275e73c161f0074cc047776bca2acfd0ba8ab026b9c94cefc2f98c02c6a9f1eb6ccf53c5148021e80530563c01100405f4f92911dc43
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b