Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 08:23
Static task
static1
Behavioral task
behavioral1
Sample
c29df064bbe889813903d8fd22bc3f41_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c29df064bbe889813903d8fd22bc3f41_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c29df064bbe889813903d8fd22bc3f41_JaffaCakes118.html
-
Size
30KB
-
MD5
c29df064bbe889813903d8fd22bc3f41
-
SHA1
e570c91632207b6bc22509f29228359de795424d
-
SHA256
940f020863b9ac5b2c1ee9533cba4fb0c7e6cd6fe8485127d3406a00db58a83f
-
SHA512
c45bc6da3ff161761170af5fb25e6b3e12ac6bf5482be747b06bb0dcd4c5574df6c06b11e4943b9cfdd9e63a3a9bfd02db6ad666fc4de70300a58a1cd4f57bdf
-
SSDEEP
768:QzfMb9J3bS4Hk+STi+STA7+hj0XKS+STl+ST2wJSTDn6F:QYJ3bS4HfST5STDhQXKJSTAST5STDn+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430822470" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50f3294b91f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000705d079775c27f2f23f007f09a81a311c1e418e98b601a8b9d8951fa5cbea732000000000e80000000020000200000008f45c9547a83a767ee7aa27a50b1ea95c50735b6f2c11556f43612582904921690000000c360b09ceb4b81d6f8f416135ccf6f52ae18005572ca23cb647af41eac7a14b5ce059d2162b76ba602293759b8770926653be56e989f56ab1a11f648ea4a950cb337085eb5757af67e8156e5b6a436248cd3b9910cf9f833b8c52802d36d9601a28cc3860ad67d54602907236cff24eca207823ed0b63bcb9be6d407576f7693234e2ffebb3edda19990bc32abf0317c400000000730edce39be60f224ef1e711b8585ac572e4763be0cdac97881208356943ce0f4464cf4764b635bb32e8f99a1c78b13f402aaecc07a277280998a2b2fbec285 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{75127ED1-6384-11EF-B913-D2C9064578DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000073d78018dc5f012668d7b3f57f4b781b9d3fccd7726134b0ddff92dc355ee3b3000000000e8000000002000020000000c887cf940d4082a159efa6c1c570342b596f48e52e9b8979c3035c388a8f27c020000000c1e55bc06ad40813998546ce28909b42d4cd4811529254bf275e0bff71107bba40000000409ecd45b2e165c95f81f11434a840e7877686060c4b6ed181f0fb3ba57957e9351263e1914ac503e7c7c11b9d6afd3e8e8802b22379edbe23e695ab41991c4a iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2484 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2484 iexplore.exe 2484 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2916 2484 iexplore.exe 30 PID 2484 wrote to memory of 2916 2484 iexplore.exe 30 PID 2484 wrote to memory of 2916 2484 iexplore.exe 30 PID 2484 wrote to memory of 2916 2484 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c29df064bbe889813903d8fd22bc3f41_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2484 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530b86fbeaf38290b7623e6cdf016797a
SHA13d8ff93b57b3396560ff6aeb9c4528963419d4fd
SHA25645b3cfe4d022db36e1206c251f44785ab51828c013dcfd5f057aac18327bf48d
SHA512378cf4f1c4131e0a6881b81c9826775ba5ee6659b0d98aa7ad07582796035a7fba93851e00b5273da847f5dc2853eb2d2d81736278295accc8dfd15096ec1e10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5401bdd79898a3d28ffae4f4646c1231f
SHA1a07adda1a21c81e82602768f0b1d1d2d0c5570fd
SHA256916ed5c15699495133cca799125da1bbcb8b4372ee8da542d9895a3589199964
SHA512ab3226566d85e84348221add11f58b5519d134e2f12fb6fb1d197fc8a39d0f022cf0fa03c45520857c5e59b545896151a15115ef67963476f59ad7126fdec099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51473eca9c088573e8f49a110b0cdd39e
SHA129de948e09edec160e26b4afee1b0804c5176337
SHA256e5791a995481ce60c9c33c6871697521254a11063d00d5a0eb4cc76d1663cb12
SHA512fe17650168b77ada29a68a2b7efc691f394d6e9c3866deafa92110ad298c3925a4d278d8cfc7387710318336bbcddbe6cae9c240ca66d0362714cb8ff190ba79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598a7ebea64d69f1f9c308e901d70ae5d
SHA1147a2bcd7adb1245daea8fbc8dd97ec7346baf63
SHA25674f0f314417642d96fdc659199fadc56efb69bdaa7d46d61c80c31c08df892bc
SHA512bd9b2bda9b6cbdcc6238ee9f9191baa9a44114b75fe4b0bec681247b140d637857a37ef650f575782d58a35f4837559fecf3e1bcb2e05975172724540ae13dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550bc0fa484114196afb4fd62d0872ff5
SHA1710ba089e99cd0742df8e3a9c66b25aac8ad979a
SHA25689cd8f050a22cb02d634bdd818f6b3ad7381b3fce78b76c732a09f488d1a1376
SHA5127dc83833674b7750ac42de6b87adfef2ffe54e1d970a20937d1e9976f378d5445511b0123fcc67d3a231a2d302e207f3026bdbb68ddeaff0d4b8404dcfb06afd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e10307250bcbc815aee08a240a79ba6
SHA12026f0b4b6c5ae8d69c9c29536193566dbf3f841
SHA2560eba6bc983af496107dab0a43951b5d74b41141e7398faff7aa3a001f3f4a94b
SHA5127135590481c42417d7d3b02e8b77cafa59ad598c43797890c5587a2bc3aa8eb42c9a5018695bff4de2e2e7146d4eeda06864cc7fa31b76aef3d16a0f0241beb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548d69e6a94d93e995cdb2a1bb270b17f
SHA15be58ec50c6f788024818d7b9a26d14cab46e265
SHA25690ec3d95fda2a2ace9ba37f90eb90c538b395b5835acac0387d667e337717b49
SHA5121af99e26acf510320c44311fa79c7a3fc3ee9d84a04416b25b27128c3c652f45781e5e668a3c17a3617464fbe262c7033e29d0cab1f0756095723355dd98e3b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575a8155781f58e063f7d45a0376a338c
SHA134c5a168f1b922c23fe82b91f8dd96cf9add2f84
SHA256dbeae1ab93d79abaee5975f968227d0b09945d894a101cd421bab1b614e4a556
SHA51293e185137991e8a3c4038c9e1c0e43553162cdf62ede468f112391c3a225af931aa8208295586bf492d3f29550c7d3d14b948ddf7fae0ffdc37705cafc165f01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d3dfd24837493a1e205166e3dc0bec3
SHA1b7141827b9bd7e15c6b4f9b869ef224999abe757
SHA256db2650774fc8b0111f84647314ea2c34c62c5b9cf8cd1024db2f8d5ba559f999
SHA512c70a4201ca572ce8ebfeda9eb7caf064e001bbf17d7ffd01d0b9c57a6f40418007be6da80b5380aa1a25b3d81876f5a561764f1dc68975e9978c98a566133893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570af3bb5554d2c5083253467ee8b6907
SHA1e702ee7bd84471f77ce4654203fac966d1f2071c
SHA256ebd5f5824d8dab7e930b839979df99a5b3d43d5cada4678e66d2ee9a30a4e0ac
SHA51248b5bfc0a51b3858646d5ee3913a2289ceb53651dfc282e58a95f28630aa809292d0bdd767a1198caf1815971d22c173d0b3a67c8560aa577ae8fbfb19175968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df8666bf983f35d288664d3ae95594ad
SHA117fc13e48ac63f2b5180aa354afc0548327b1f01
SHA25601930087b90dbcd0b7257edcbce6d66611886599557af1bf1371ca6f9b3cd6b5
SHA512754c9bd61da45eba6b8d4aee2b1528c2d08155299d6113cf9a5df61b37c40b470449632f9bc95111d4b736f96a3bff56b32598b1569cd9484ac2cd6e9659822e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58516af24ea0d84f97854ddfd9b3a0a79
SHA1fef8c127718bd7a0de72786f2741b994d7dee0f6
SHA25636d62d0a372e046602b246547e92a5c46dfd5f8365181712529042625b428327
SHA5129c90e1499e4cc721a59571e1a639f65cb04207544600ee0b392cd7491e7b421477f546d5cc6694706f648eadf06b7179f5288ab17dad2ea7ffeffc3b01e03f4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5078cf9caa796f8af10ae532cf80f9673
SHA15b0b705f644eca977578a0a5561d556666cd60da
SHA256aa4689310b4e416202e7efe8474211b6f8cb1e353835cc92d42165d445fb1cca
SHA512cdd7c004a23164cbe601843b95d554c34d1f29f40fbb64d41ec204ba9a1eaac8bc39ce43be5ec0828507c70e37509d101a63f3da0af1eff0af0dae373b70827f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5447c826190c414778ea8781d25d3fe3a
SHA136489410aa88c07aab155bb0fec54032c3d9d30c
SHA2567f46158e01a73b19a1c2d46a25f324f4afeb01c1354247f750e0d8d934e6fbe3
SHA512be16cd69d790729a20b3900179aa26e7f837e39893a4beb0a08ee7755c69049202c0420da959ec95ffc71b75ba395d823534e30736408a5d12b959e1c7d484d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5259bf742812cbfc14148dbb09691dd04
SHA1579c11dc0acf6c1b81914d6b0e7731cf54081978
SHA2569c22751a8520a686f3f9754d7a9c2eb6d79880fb5dc92043773c0454f0d9b086
SHA51237489e9441a7cac3245c5e195e8ada81663da3d0fd18dfa4536f25043f4d479028134a44619e442606794eb96097788f858a1345b37870d4c84b3785d764c24b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfe3ce515320691380f8ae068f3aa256
SHA1cac97bf0e6ac4f2d8d0932dc0231d2f8da789a9f
SHA256e20063c37496ec790098d65d03681c3369f848683f4dfd8de8de7f79d3a68b2b
SHA5129760d7087b760420236d78bd12e4977db430773d4084baac5b289f18d90017f4051cfe10ac09616b308b885a825cbe178b7804d7677d96687de725641b682805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea7c9aa8b57cdbba56d3b44dc6a07d38
SHA14c7f3ea70d19e5a7ee09bac5f8253cb6014f628b
SHA256c35b179d1a03da371b59e37e5eaa8733153bef99862ed9f6661024edac50e9b0
SHA5126bf8a4240313fa70aec4cd0333514881ae3ee79d3ca99a3046ae1b6f67519aa2e22e41dcf96b86fdc4cbd1f4201be088ad0b8100631b6d5cd562d159daa09b6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56aefa74b36862f9ce3172d813c166704
SHA1e59d1a30927f2ded6e0d738ea8aa290e2b62ee34
SHA2563f7429db58fcd6f33199f7d5effd7f2328d1d410c76962dc6455d14ffc6cbdda
SHA512646bb958c3f58dc7fe533d92755cc30a7579ce929c47d9c722ada0d4ad45d3b94d979b37848aa5d6cb73d91042cf696b2f02671e17cf96f8dc0044b6285c6f23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55177f07ef55babb8fbb03896b47fd5ce
SHA17949a44a8e9f932ea85bb8323cc335a7f4bf354f
SHA25622767d838f8a62a2ad339f1d1e13de8b2fcb87813bf5031aa62430c49c3168f6
SHA512286c43614511947acdfdbae15f9e0c3d12aa71fb7e12148753fec8a1a483603edc6298090d5b42a245b3be7006db1ea2c1d7c60d8352a696a6d9a9378fad354c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bae31adac9b47bfe2cd90ec0bd457914
SHA1baddb5c71aa97e4235658c50b63c617bb678f00d
SHA2560bd90d4cd8eed7c4969072bdfcda9126338810455d208bf97882beef07715ce9
SHA5127e7102785309788d9b3bf8ab5b33e643b75c7bacd4b779a4ec60833b8e485579ea23a77b4b87afd640728c4933600303032e959455fae7ede506fe6f5f7c0230
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b