Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 18:09
Static task
static1
Behavioral task
behavioral1
Sample
daf037f10c23ae1a01178b0d54f0587a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
daf037f10c23ae1a01178b0d54f0587a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
daf037f10c23ae1a01178b0d54f0587a_JaffaCakes118.html
-
Size
28KB
-
MD5
daf037f10c23ae1a01178b0d54f0587a
-
SHA1
47026f96532ac68d1f986785ab8db12aaa3a33df
-
SHA256
489a542cb273fb3178144fb3ede223461da2ff7f9d5ac60f46d0df5120c4c766
-
SHA512
5374cebbffa4998ee98c5249ed41d19f868aab3f9900b5b8cb058825941451ec58939365aaa533ae432251e3636ec19381a4fd829ccbf1c33c2e1765bdd9dc8a
-
SSDEEP
768:Zcd9QZBC7mOdMgLpC5I9nC4KwYwxw8QHPd:gQZBCCOdT0IxCxwYwxw8QHPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F058FC41-7068-11EF-AD58-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432240017" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000837274dbe9c1d3ce89a4be904ba930bcb3eb17a48f6a80ade8dc6e27f62af690000000000e8000000002000020000000b3a50293b9a96d2c483d9500e087320c8d0827a96b679cf4457fbd0cac1784992000000008188216bfc24c7e948b657c4ac9a1ec664a4f30ad5409dea9da02dc7e99275240000000623f26395d047004100146775a63acacb528b4ff9eb5d4e473b46dcac1dcacd42c7325747a4e45dd890cdd9251938b52b14173335370e14b3f565fb49d604aca iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000005a09725eba8705aefc4915597b47cf5998c02748619789095e7dc11cbce11918000000000e8000000002000020000000d1e9b27276dfba90f4ae89df08eb2fc177e065589266a8067b46543a87bb2be39000000030e8842613b04c4d89c247e9ec2b93eda0065270576249ccf01d7cbf7798eeec497d7be069c1c2d065b8732f9f232806f8620b13b9c33451ffbd62cf714c8147ff8901dedeef505ddec218c878a6513f938b2bfacef41cb3e3d0f58fd918c71ec7ef475338610755b7b20e754fcbe1823960bccef373e48b9f05204357a9d752015efea5df531029477a80cafd41d09340000000f347c44c45d4a08c14fe6ac29ce3caa18a13e36c2e41544a6c8a443b60680b93e6aa438af59b9318d4de21df5f16945c81667e8931c448aecc1af815f056d9df iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40ee49ea7504db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2816 2148 iexplore.exe 31 PID 2148 wrote to memory of 2816 2148 iexplore.exe 31 PID 2148 wrote to memory of 2816 2148 iexplore.exe 31 PID 2148 wrote to memory of 2816 2148 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\daf037f10c23ae1a01178b0d54f0587a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0bf341039a2815ccfeb059a59e04a45
SHA1ffb443739823da7668438a138ebab5ea3e9039ce
SHA256bd5b9f5a2d1e7f23b089433ebc8b7c09590c42af5ce4393c84b78400ea1de51f
SHA512a9fc8877ebad54ee4c8eb108c2c62e609091b2f180c9185685c2b7613c5b9c4687f4e83111179debfcdd47934780b359c3de12f3f6e14ea0ad13e23136d1efba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9da9013cd1c43e627d33e8290363880
SHA1c89613f3100bc10102efd647bea871c530f1da27
SHA256f6227ab4d415d6f4397ea1085321152223c6f8375c999837e47e3c16a9954cca
SHA5123f1f36d48300c9427623c7c10d73f7161eb187a99b05ea0ccdabe631a66bf16940529cec314fcdc4a7dabc5234938bbdfb9159a11f5a22af5af5f64f13286b93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c588a94ef33e63f96d7a669e424e4b8e
SHA1e902fa4606fe55688fe5a27d0de79c754addae97
SHA256a7992a7e900d2848079545735d45ab8b2b713a30d77e7fef59a9a58244c4e3ee
SHA512fad8128658c0292eec000ee3a5b3a269aa7712ca9b049089e4d5f05b2d986751fc84ee5d1a74241979a0efde18f254541152240f5c594f43e6e3a7f30c956fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e9e606e583565a5900bd51451813e14
SHA1acac1bcb291c2fff822c5beb41f715b19ab80ecc
SHA256a30ce3af86d1f263f9055e2cd5f99af19422c0eedce636624b8bde4d49d42e74
SHA512a9dc770124b0abb06f713274252abbafab273ac26edde8226dfe38e1d03ae16d0af959c8c534a8423d83c10fc904f5dffabe74c23aa5cdab5be026a565dc5e6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dce52a7571a54e4e3c7876ff682a15db
SHA146fd98ae3b654b3b75b551e84b5090b52294d279
SHA256dfbe933a262d883151d5ab174af9657643cab665c8340df037c949e0d1ecf6ef
SHA512d65e6fed8fa609d0b0f791198eeef7c07190671d5564e40ef002fba0e2caeeba4be7f0846e5c7c306d2417c45b533789df6bdba6b037a86665feaacb7664f1fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e33f8a560310c718e1f2c4a529353b43
SHA1430c12e40f7ac7555b908ad1440ccd14445801f4
SHA256f5f33d021e6fd99379cdac246a78fe466daeef8045fd3b2689f92677d1fad190
SHA5128b94c0f5a771036ef4466d292a914bd391e84f3bde011cb6c3c5ca23f7a0cd79b9365ce70f55e5e2652b55a5a99230f748dc77631bff9810e9203574f1a2ba2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516ca2701a5e78ddbba7993b717dd44f8
SHA1488379f6bc6eb25cb8708361607f7d8edba79253
SHA256b26218bcbe2201f7ba88a86a434b0ac17dbe1509aff7289cc9b910806300142f
SHA512afb63bff01a8da817b9fcc970965b0d636dc3a2da9b576296c66a36375b699b799d2bd91170cb4c3ebdb99097068fa50f12ab32fb4f7e6d520df748893ee5b90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f0efc953d099b5f55194975db30d202
SHA129f8e964f565b796e45d9d787852d4775cbc93fb
SHA2562fc21a93651e2435935582c928c12ad3d222e6ee8d5cd8612fe177a971fe79d6
SHA5120a87badae619ae9c09b3ed424faefc3ba40f9d7021e2b4bedd357b7b2e8e1e4f74774c434e74d17f7ea8dc2c64cdf55a88b4e09f5ce80880d630a628ae3bbb68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc8c5eec02331b69d4edc17ecc6467dd
SHA1c83b3b6749e4bcf4cad6d1d506d3d57832f5ad3d
SHA25604aa90a007b6dc4af70915ba9256e23cad7c735731e7d3b5c4f8f1b5a02f9628
SHA5127adbbacb619d3feac6717c74cbcb9897ce675a90837852b2e1432d30b590382698439d709a63c491cea9d1428893852e66165a2dc0e39a4d89e675eb908f441c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bbcda4d1f0e77559b7ade9a2d27c565
SHA1bedfdacbcd3a2e5ba15c347f1d7b9367bc750b80
SHA2566856a1447ddf934454e2710faf5d2fc0d4095020d151c0624d9975ad3b895f91
SHA5126abaa000be356244a157bad9db0cef3d3685d89746f0a18aa83af92f5fd9db549ba2caba0fe4270efd12b3776e8432c6b2a678b6979ae47a2156fa366e833bb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502c08a17c9298467519304816be2d16d
SHA13e48eb04b61d56969de5a1071280adf8891a6d8c
SHA256ef2c3d3afac56283aa2c2195b50d8bc21187d9f76eba067a86d36775ff567d82
SHA5127d22a3099edb1ec446a0f1203be26acb0761885d5dc6e35a7dad5f424c18e1c4653701ad4a53055422992bcca094610fad514c732b5b022e1864f3d0c9c9012d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd2702bfe042aace3034aa63a64a5c06
SHA1933b020f44479c478b5afc332ee0ef1eeb4e1069
SHA256a4b72fca7ab75c464d96297dc1159673ad99637a0b66ce9d55a7a69286398ac6
SHA512a50cfb07805b7d7b422ed46927879eabfc69fdda03993ae33171bad74fde60b19f66bff3970f2c780d1aea8c4caf87f0607d559cd2b531a323fafbab1ba3b69b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b5df74d2757765bcffd05ee044ae71b
SHA1f28bbf7340c5e7ac26ae4ea258797faf86ca5413
SHA25662b5e432ca878943b8765db385731490100ddbf830ec92f3425c1d2ede5e0933
SHA512887a7e47ab6e2ede78492e918280c9512b517c014750449cd4a5c183d4a96396f70db6b063391366fafad5ebfabc3c3cf0d4a2305e7a2b799aa29915131e4503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aea546c53a7f9c581dbec86baa830e0b
SHA15d89acb9d1c8e164718c65f6a853aba092562779
SHA25665db7431160177bd27de489550231bbd78d6e009cdf42f83eea7b7148db907be
SHA512c96cd20473aaddbe09ee5eea7fb97f77bd68d71bbdd16e47ef0f884579fd75867a3ee181d91f8df5ecac78cf2c56a4d0e40ab7aa7003a814abd9547428238b48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5280731482e9b01e75b5f24434a5bc1f7
SHA1f7c2e0096e5aa382866fc6b64af694bf6a458a2b
SHA256b06c8e4219c5c9c428fc808c58ef8895a7167df6902f6eeaa42acf9574134ce1
SHA51225100a90ce05cdc25a8325346c95d8a4c1c52fb1870afbcaa62ca0ed01d080d77e5400fae0f2113b54e1708c78842172a901d31699174f5dd0a7ed31742bc07e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508a2a752d0d1b9040af617f7bde51b08
SHA1748a5e79d0a2bee2976609960f7b208d32d817b7
SHA25691adc5c2adf1bac47b521396ef37d23c63e0cbd70cdf4307bac825164a4f1c53
SHA512d60b55c5eaf20d1c9cdf3f23bec504abe79acad2bf0e376c169e42593151fb0fb25a1734dda110f613bf9981486e6857b798e74c7b274f2c6b9ba5b4c34feb67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ac80bdf299379bec1ebba408c4a2bb8
SHA108ecb00cf5178a6bfe42c91bf971b7682aed7f0c
SHA25623ca416fde9fb1ae0ef83dac3a7d84e7fefb49e6f8e15657b1578cc29714d875
SHA51209725448687546642cf57b32d7e16da51021d05470e41c6fc5990cbc3f403e224351fe2d4c56e5d4bb449ae1cb8bb100ec60fbf42cfec95acaaea8948d851699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b7d0a289b23a8112f044800ed2d6694
SHA1f2b81c77ab6e54dd3974f54ccd80635f000330a9
SHA256cbbd513df1fe950485170f498e96853ebd625660bb2b58f105861cf307518bc2
SHA512fb2975550ee55b485746612bda871e1e32eb3ecad05e9be26073118eae67ee6fffb87dcc0f9bdb147bb599d1eb3bfbc39edeb03d144c23aacc90130096d85cc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd147e69f9b78e46b8867d346daff31c
SHA168e275461632fa6fdfa43d1ec27f96c953f324cd
SHA2565a63bf3313a916edda63e100b7fbbd974d58a54b329646044dab588f01578862
SHA512202f4dd127f8d8eee8a833c2c95e438f633394b942273e87a28ef45116c331decdfdb7bb063d1a5b488911ff1c16300dbdc552d43b4addf8067d82fd2f708924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531fc4419f566c47b1f5d9f9c50a25142
SHA1fe73531a1ef82a0f76d117d1a1e96aafb29f33b1
SHA256847787b15a6bd95cc4da0d5d52748f4623170681e1f86d3f5aa859c599b3117a
SHA5124e5cc46f302c65e81279ab06e06b7933ce783b8da8ff592280436688530ac7f938f52c655c6225a58424f2cc159fa9521f66348a2a7ca53d89d69cdada239005
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b