Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 23:33
Static task
static1
Behavioral task
behavioral1
Sample
d0a6276cb96fd0094b669503611f1b79_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0a6276cb96fd0094b669503611f1b79_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d0a6276cb96fd0094b669503611f1b79_JaffaCakes118.html
-
Size
36KB
-
MD5
d0a6276cb96fd0094b669503611f1b79
-
SHA1
c8b1613730c7e5f0fea0365a205afcc4c29d3d90
-
SHA256
fbf61b43f5e5639fbdc3c01b8ed42a9b94b08193f09c85b78f855f97117d36d9
-
SHA512
9c0c5060033a5abcd45cfa12c32642ebd532be1af9407f7d64d731f4fddda6116054e9b82e29ab07d50ea84c314104eea2ab8019a23d6e67d44fe01ec8028a50
-
SSDEEP
768:dATWn3VnJL5h3Dk7qXT37m5z5qMKQAPfp:ScVJ99Q2b7Wz5qMmfp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000009c87bc35e32cebf4112f31282a4d5823a2159e78de5761fe44b8aa8b922544d9000000000e8000000002000020000000b6b7062800d1b2f9c767f8280997b48f25eee4f898ca77803a9c3f5dee5319db90000000c2ed534df638af291f1bd85dc53a731b30a1488663afafd154baf68bc3d0f7130b08e98027d90f5a9d301fe1108ce74a9a1c979d5921e4a98dbce04c90ef53e45f7d72cb66b7f7ee64f1dfcfa90f5aef73b4171785adf4736f774f7f878c797703ef2d7ad0a3060ed37e7d30ecdd3c9f1159f0a3ee921e7b5df363271215fae8de39bf5e9f69d8627efe4e6d91b19c344000000040fef2d71c9aa85cee7edfd7660775536f4f30430f10c1fa6b01f57db3e1df5eec140aeb8d894fa265aad64482cefa4ad5abb606acb3810f79a84bf72e4f807a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5D035621-6CA8-11EF-BBD1-D686196AC2C0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000d4b46d32688617db8bfa9dd00268b9ef5d4ba2eaf83b7a48febfe4eefbf47f49000000000e800000000200002000000000263cdf9952cfcef8d4a9f86e5a104c3cc64f7384223b8af3c1a8f17b937ab02000000045198274e7d001f15efc4b2e26cd6fb722041c954330d311837f49542b1b461f400000003d55ba04f9b3c3f164be508075b0d791daeacb80c28989b2da69fc1578b3e6196438a39d6a263d3dd16a39036b2e7fa3442f76b3bed1ea94044c3c29734e067d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431827452" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30e62f77b500db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2028 iexplore.exe 2028 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2556 2028 iexplore.exe 31 PID 2028 wrote to memory of 2556 2028 iexplore.exe 31 PID 2028 wrote to memory of 2556 2028 iexplore.exe 31 PID 2028 wrote to memory of 2556 2028 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d0a6276cb96fd0094b669503611f1b79_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ebbaf975a1543f51b0b93d11b1f5d74
SHA101812914109e8dac5191d03c6f07ad0db031a9c9
SHA2565c9e24c089b16423fa55d5c09997451084870596cb8489e3e346379fa90a2842
SHA51279502000cbb01d692a953150de0f2056a546879c0eb794bf46914b1b8188a367064fd093d6a78df9bfb82853dd685be628df6bb91f9add0b79b83e9285369cae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5378ef20dc9deb6f82d8a42b89f87a8e3
SHA177834b02ad5d672ba7570bbd94d6546374bd307a
SHA25620c2590a584964dcd280b2cfc91f3e6ad0d70e744c5ba6dfc482ea2b68ff8956
SHA512b83e682bfbfe08d486aba7e05ce0aa9f86e814bf02e56b512ebcf18f0a319e36a059394838a723cc81ed420f258c943671179e2c13b2bcddae52ccf1a365c9dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501810ec89aa225a7111b632fb24d63a6
SHA131a956c5ed92dbea3dab6cc28d74ddd598724e47
SHA256351478dba3d121d1b399c90d19a41aeddbf918cbf3ca909eb7a95b7f1ca83d52
SHA512a4f3af69086accc334d9fcfc3881567776eac707fcab5e3e1ef3eda4ee36baf010c9dd28f6e701ba9ab98282d1118ee82b533d3cce1319309144ddea88b281e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5467639d84aeb856a68f1eaa5082d7731
SHA18d44c28a5b0243a8c7c87531bbd3cec289e6f894
SHA25624a0a5d332c49ca3a00d40c94322ca6fba90afe9800a1a67ff57d86a3fda1669
SHA5128fe0389e106c697fb69abfe31ab9ff6a2a5664c590484bdf6898762369a6ddaab2d93c24f651d7f48bedf09e919311b6eaa527fe643ee992e1e129e401842e60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5819be9ec477318d97be19e03e3d4dff9
SHA11d698b74d7bbf70b3524e2e0d9f9938d9712eae5
SHA2566bf1f8ef3e5d5993086da9c71031969a8e7b78c9be6ed8ed871eb7abd4a9cb31
SHA51299a2693349539397c59164618054ab995a0234da7ac65aa01ee7228566a905b2ee66e4ac0079c6db8169e1719cd8ee5fc768d69cc4def8de5b3fc68ff73cd676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e6e4dd8726cc435c1d43783248ab0cc
SHA167044a068c0af31be4d661146a57113b2107dfed
SHA256d305e7837d688528b8b731fb72d3c40e0a036557eae82395c79808b9a82015c5
SHA5124e189042a7f8913b56f2dfe1e3db0b29b87deef12ddd09098d3365f203059103f15ccb48ef40c6d6fd7f5d099882e4ac87d6f6c196990638f4f69f5a6b3b0ed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1720a2e75a86dfdd650a0fcb60f0661
SHA16ed8954d5a8527170056801df32bec3dba922d9b
SHA256b1be6d535cb4e3910dbbeeee2d6d8392f55570d56e00f7f6b83f2c0346de7a2f
SHA512e26ba47d8b7d34e7f368add95e9c8de0c11cafe6cd25a70cbc07a39a258b1c49358e7729b7b63850192b81f754c38574a353e277ab6a921859e62531fb96e5d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5981a80ef117caeda478b5f9dd8b90589
SHA1275392905d9284548ae7d23137eab5479c1b4b79
SHA2567d233c0b39ab46317f1e3e237aa4601477e474b3a975774faaffdee4b96446dc
SHA5127def49cfebf445060bc8125ec37854a0049cd8c159dd4415e7029f2cde14f9fcb1a5f25f5d912ee4ea14d075ac213c4cb1f3ceff5d117e77dfbe54873e7f072a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a93d3831fc2998725d3db09d2783010
SHA123e4e2695948b2829534de1221dd2deb79f297c1
SHA2564272fb7378a315c40fb77b7403ef5fff167f293cdf2cc92690bb4820c8b8b8ac
SHA5121ca630bb0a0e1460f8e19d5279c7086dd79329912459315f5652c78d224a4916010cc9d334e3e9b6a7ccf22c529a23c6c0827e8de78c2a7a45c99e388ef77c1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524e9859e902ba065f68b7c8d519157dc
SHA11ad045cf57c98ad9f6152f10516aa980f3bf9ed3
SHA256e7ebf3cea808320ca87404ca212de45de9563d5e6f1f284b19db12cac6dcfe60
SHA512112cd6c88532833db8dd170d6b0be15faaa47783071192c7195eceb7a98596fd22f43688fa44cd11e1243ea79f6f0e9e87002425795927ec507c7b926388710f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51db6a93e1dee37761ab4c7b4ada64871
SHA1974578ca558fe498a50623f0b3ffa3bc840b5343
SHA2565b0e641423259c50ce95e478c1abfe122bb4d24943d6b831c668edf67af3021e
SHA51203f9594234964fb7ec67b0a0618f55e5aea8caca924b33fc0fa7a34e39125d68049f5be33480388b69fb8aac25533aedc1b2bec77dea8436973b405f8f378111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8360ee28ee1eb33a4156ec2f0bfde93
SHA19d732ece3ca553cd5246e7e11d773b069224c644
SHA256d2a0a7a79aa97a9fd992ffb911d5f5b9ebcdcddd2c537bc340502376187f9f0d
SHA5124aa8ee483663da8a94c1f5e0ba5c97fc64068c28b67f62ed870a68d508dc0a417e558ebdfb7f7eafb77839b0c747fdc9b8e1d7db579357ac92dc74239f6e0d7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5933e7df63975282abae41e8d71c1cb99
SHA118403cbc2c6348622336fb2070cac3fbd16a0c7c
SHA25663053acdf026cf5ea2d0f11ece226693406babb5d782f9c20279117142965fdc
SHA51299202b72472179294e0199ebce799f6f5161e23eb68b1f2f5d934e106563ced1087736ede5ade7eeebd44ec131a1c2fab88e4e2b09e0e3d5e0ee4320e61667b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbd6d2c52020baf6d330a7f3ac11a6f0
SHA13cf7a5703eace3dba6a74cfc20f572eeca063e16
SHA256b418183393085e6faf7a312e1a1ca577aef64c1fec36b8659ff6bd493d155ad4
SHA51297993fa8942fe1d9632685e346d4aeaf596fab5541e43f8cd30862feff77b83e35e7f70b7f561e1c7f5d26028e58f5ef33493a88961d101434a1ee70143ce68f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d878421c53031b773cd181a919e57ba7
SHA101d6d99af8be5810e2b63bbc06976dbab0f50d73
SHA2560ad260e6926f46de53ffebc8bfdbe1900b2dd53913725dc1b6950b7db8e143ab
SHA512ffa3c5435dc0b05a5be03493bee28387c550a0cea41e714fdebbe52f036495b21ff290f2fdab0b4b00aac54117df7512506747409ec96c687479f8bd0696f850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f4b44e65e69d3c0f77bba4349d70f08
SHA1e2ae394411c3c758975a032a607f44674c6f2e31
SHA25652b51d5dc802b8048716cee7a617fff51c028dc884019bd4133c7d700e97a546
SHA512a221b495e6ba771bd2dc5eefb67ab3695af0f7200d4bb935ba5725c39682adc354955859e987bcaf7f5d35d204feebe7da339eab22ffaa335ea2728982dc8878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59926ba2ad3fee0d8a75ce54bc1473da2
SHA1dbfe88cd00d37a132775515ff0669ad51acefae7
SHA25699dc24c854a18f5bba3e2190b90f449a69cd27d840362b8c8e3d49315c4c4cf1
SHA512cf955795c2bc8e77e4626d3d0e8b989116992599b0678a5088d8531cb0270c4dfc5da2347682ccd9d79b9c2cb3b099ce8c7c2f7d7c6a5f55aae6b62c0693766d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5360d662453dd7b934ba29006119677f1
SHA1d406fa72df4039347757a093b8d0a00b794ce2b3
SHA256d06d49e94b8c26d6e1c3ebac050878eee86a8126e31cd35b08576e35e89cedc5
SHA5125c220756f413b45025b112502efe19dbf8f8d05b506c4a92fda241d9a390f8ff0ca37a8ef49df907a42f3ed6a1759c0e059c18978fae40a5fdccf7b52410b7d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ea33af0f69d70442a7f14d3c97e9849
SHA1258305ed63bb55ac9a4d74452bcef70df9e993a5
SHA256a24872a80b05987a9533a9b0d943cbd62cb1a6df9153ed4566acd62021ea85f8
SHA5126b351b3d5d8386e157d9c8ada1b02a9833af85a439d2baf54de6130f5bbc2396394c543a14bdb01e29a3d3128feb1bef8d03e48d39cf9720fc63a4a7d97052fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdf606e733583ad2aa1b1ab94dc3789d
SHA17251368deb2c4853cc50bf9938941622f66b3590
SHA2561ddfe285987867ba962343ec62e2b16a3dc619613ee6931f2a3f4da0b0018f4d
SHA512c6b979320d7001ab9003334565d721d11ab5a91938522078279c7bd60799558d005c78eb3a58db74a87cc1729d3a6e31024780e79bf4d9d81570085655284984
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b