Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:36
Static task
static1
Behavioral task
behavioral1
Sample
ea98b4e4dc9dfc367c7b2d2c036f2265_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ea98b4e4dc9dfc367c7b2d2c036f2265_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea98b4e4dc9dfc367c7b2d2c036f2265_JaffaCakes118.html
-
Size
3KB
-
MD5
ea98b4e4dc9dfc367c7b2d2c036f2265
-
SHA1
75d319d98bec920fa98efa2659062e69d3b076e2
-
SHA256
0c39f5aa7e793dda200bfca361890399bf684f349ec0c247a55e9a50697373aa
-
SHA512
e1514493df94079206890b42fc4fc79bb20342cc824cb732cbe504969a76d4082e7756e4ab9ec40db7ece333f2d0a3b96f7a1b39608a70063bd9b1c041a0fa01
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AFF75831-7640-11EF-91F6-D6EBA8958965} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30afd0844d0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000008a56d5cf1ca2521756270c6399d820987768cbb64d18c5d601252bae3bf26cc1000000000e80000000020000200000002e7c34e87d524a1df47f342907599a288069535e9248fdc948335d7e08e5138620000000840dd44b4b2b765fcf882c00c5aa700f1a2eb8b1af3db6e0b54d79f0467b3e0a40000000a36517def9e1a9e4763af0c350ce4a80e503a863dc1b285194c868a0c5bc8228d23ede5df4cd246884bac44eddfa6c3fbcfc267879074e0f651eebfb87d4b6bb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432882435" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000080333992d7fb2c8b7b24d22340ef085fb6a125ad3a4d69ee0762dba4eb609b92000000000e8000000002000020000000b631bc16409b30a1aa5769b6efe286686ebf2a11fb93ef4fcf48ab574204b7f49000000055ca9026fbe316d84e8e827c281334b1fb3e1c9dd11b5f961399f11a5813a4fcee79041afe11f3908bbac4db28795676b54b9ef15827f9944619defec59ab0faa10617ebc7f2cc0d1fccce71f578a2622ef5c1acd8f1a78ea604418367ac1387f8704d5e0c48c683d3485d7e11884f257b73b9902e1a29ee7fe23b056778eb69ac858a186956fe04b67fad2e146bff7c400000005a2927d5e52001ec37bfdf8b3c1913d5f2a1a3f623382c9aff63caa46a09b2aca67866e19d3ea086d058f3f4db1957ad956648ce63cd7d6e92ddfe2a585df37c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2512 iexplore.exe 2512 iexplore.exe 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2628 2512 iexplore.exe 30 PID 2512 wrote to memory of 2628 2512 iexplore.exe 30 PID 2512 wrote to memory of 2628 2512 iexplore.exe 30 PID 2512 wrote to memory of 2628 2512 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea98b4e4dc9dfc367c7b2d2c036f2265_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b77d42d0f2f776f89374a925d2571ef
SHA1cfcf26e4f554071e2f0d9d22e3b96aac76a7dd8b
SHA2564476947b5fd53ba1695ddce3a581bd1aa7d3b1c35879cb50a2af60b04b7bf009
SHA51216f93d46168d191d6638fc649d9c491edc33aa4dd7e859a35b8928ffd9c55e755a003ef0e3c05884c83028a9cab681b395fb25dc60d8a52b89e9da2bb495342d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d9d644561f2659f494e861726b62c05
SHA177960c2dcc5fbc26083b509bf3d64e125cb97a34
SHA256588a21eb9107511a173a9ee60b01cdcd5c53a0cf8c349b3996f2dab21f33c393
SHA512d6eb5c369448255188e8410cb6b98062f43cc727ac67723a0e56e8d13c45c521cd606d3c5e7d3575bd593e9ed8d910478b064991b271b3843c794499debda24c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4ab8ceebb89cbae36bb2ad89083d4cb
SHA1142860ab005ebcf7b1b627363f633ba565528c0d
SHA25627779c4efff13a1679086c52f3386ecf61ce04a1b7e86703c9c6454afd0bd4d4
SHA51263c76769bca577048601f3838a9f2af2e7024fb8f881673d6a9db0644bf61defd8cd81bfe53089d7bcc759236a7ab03975193a8226efaec53cff6184d2513428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540f98ac72fccf71554bb5723af1222f1
SHA151c4c0ffa9c6f78773d1727b41686442b10fee3f
SHA2565881d900bd52ee844d2caecc5883f60a97472d523f7f26ed6978254ee08647ba
SHA512b16dfdc2346627120205ce18008d5661d03df9c46b8a92c239d841151745f15ae4e938f0bbef5e130348839600c45ecca010257cc0f04e35ad3375c0616c7b26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5870f7a9735f9a3cd8b02e1cff50e20ad
SHA1b116c7c0fc4c0118a3baa5b132d879e70243c929
SHA2564f6a763a3b9d7fdbc2872b11456c5a58aad7c32b843da99dc2d41153875c1453
SHA512255b14d9fecd15701257610bce1a4a534cb4cefc0d35ee4b87143b46ec85ec6220a4829be6c8ddc6d9f9810a93ac733b9cd33dc9ff974ba22ef3bea440d1244f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d872203ba1a4a04a8d368bcf3d525a2
SHA11f78b3fc7f89306fccb8cd81de1d4cf136a6223e
SHA256e263589bda526a8a06e6ba9f68ef6abd47d3cc519457d4e9b61a89e566233e7e
SHA51293708e56cb7850bf736be5d13d9d59aa30986da669a6af5ecc5cd3c8471d3ad7ac642fb7baff78bd0e87ad8848632d1e11b03255172cfaded03bef08571e45af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57acdba4104d2b01bc8c1568fb85d813a
SHA134e6de171005a5359a80af69d84d34635232b6b7
SHA2565c08feabc85269804d54a607c27cf98390be4d1cc8a4187b12a3bc02f01d70c8
SHA512070dc07859e7ff4b4fecb47156f6f49d58c3104b81f185f3a3e108547fd0df9f07bdf99d5e7ad6ab4c8035f85c5299bbbc4481dd001b99d94cd137384db9fa0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd9c0c9d2b246cb96c82a392340eeed5
SHA1ce55fd67525633b30d0541ad3859788e73b84740
SHA256dc96cd31ccd923fb825ec3dfd699bb16b1ef7ae89894e7200bb5b03bec8f27bb
SHA5122e0764134f262d4bbf79bc0d1a839de9142cc518fc535df0231329f0397e3ce1a598af2c4843e36320115c939d7e279b16d8f99699dbbd17c94e9cefd5510996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c031bae14eb620ef3417afa909f2da2
SHA1b2bd09e0b89e2baadf7f1e857d1d49cf1f0fa9b9
SHA25662bc94a1fd895444a5a110b1bec991ccfbd58b4980c0bb63e0756ded29947d19
SHA5122745cec2689b8b2748d57c60d20a33441b65161aaa898a5086f651406a8a3a7477b091ffbb80eee75c57726fb643dbe70e259dd7572d59fca3732ff56662a070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5281721498291135c6830eda7ef072100
SHA12b4d8f2307356e709507a0fba278549643410867
SHA25696a77dcdf7644d4a74858f12bc67d15eb4be64f9329efc29a96c35e7fbb24a41
SHA51259be680df1024379877d5d7f855d266a5a9336f7708ec0708d6ba3414eea72fe1d2610bec39dd59e4f62252171e8cfab90aee4d2ab9c5a0bf82156a2aeb053ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfb0440c4316fb0dd5360f92615c4d7a
SHA16d96bed5ca4b77f51afc73e8120538df28188303
SHA25619c96f85af1d35e283635b8f89d12f7b208b2ae185872ec92dcb618c1368a6f4
SHA512e25f046282b67c95178d98ec2a442d7fd9338a0226e6765dc0d130244caa52bc41caf13907dbbeb795e2a05abaf21b3b8546347afa4352af167acfb15d194089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56059a4c6259f6b1790ba0c6c88ee1420
SHA12fec37d6959897ec49e72c5902fa4ed81d4906f5
SHA2567d1d597e848622a8a8ace596df04c877e17b9ed0f0c1e036120b8ebbdd3b294f
SHA5125aad8d773c38f6b517edf77eeaf53db02b6324b15b9c57ba75e8ce0a30ed55ad32c352e37621f2f8e7a271848c650f98513ef3d759f06bb7c631ff733246fff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f578e33103def878adbaac3b6969c81
SHA1fc0614a892f471fd4c8b623fef26a8fd375044fc
SHA256303c52b8a38bcbddc5e97ee2fa854003218685456ee57aefb248b4e1dfe545c3
SHA512038923513e69480fc204fcaee254d7e48e8ece2e4654fcc3687cd44160586f66409a57dc5843eefb9391e734eaa85ae4df092b99f53093b4e2ae94b98370666d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559526babac573857f8eabf15a62140fd
SHA174ded37818d6e577a5e64221ebc471d2153da9e3
SHA256a1c4541eea765c6fda2a8bb6cc67f9f87dbd3145f50055a4523f12d172f385e4
SHA5123bfde130fec2c71735cfa9643b0830afbaa0b3e550b8db8c936b8d993a9b96a7325b365e65349007fbfe7dd6128b546fc55d100bfa3e492412a406c631ff35d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7e9ebd1b2d542f0af57218395d791e3
SHA12e162fc981af5e5d0535f8c21dedcbde578f9f74
SHA256f1439950a2a7e44eea43b9cf8f027cb72ca15c31048bae77369a6e63d584081a
SHA512bd048332afb0bdb514c036fc342a1daa6936ae144307268b6c67f73355636112ca11641d97fe95e4bf4e75edac84f9808a59b6f28aa2bbf58cbdcfc4e2089e9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a273e4b9c27c0abc9e1be29a595cb85e
SHA159f7a511d1d7fbf423f9fd59a5c632c307626f1a
SHA256e273e838f035f5f033599edfc47e8d167f2fdc76a0f156dd65211121f8b1ce4b
SHA512fcff83cecaf39c65e4e587e2a922fb989b80871b133b7332b642a1fd5b86934c9514e100a9dc69b0fc94f5c6d3c07f8e4e8549d8fb09565d81fddb5f166eab72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce860d789f726a3e3ba4bb09158ca5d1
SHA10b3fe3cd355911685aecdb791490f2bf0cc3c35e
SHA2566780402bce3fed46a64f5c1452d0ebe602800ad32a22effe0882a3b7cc074ff2
SHA512f7dd625740f99a7a49fbaeb95d0be374c0e785e6e97323363f2287757bc820567ad1fa3f09c5b13feb545334bfb3d2aa43ef54316275029511b6fc8a1f5d1a6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb3dffbb7aa2309d6a4066ea672d6ddc
SHA1fd945deb6ce0e8f6372a037885981cbd3ca998d5
SHA2563aee7c91be9206341480b4eb50a4b1acc56210db77bd9732192acaeb1946ba1b
SHA512e672b3f08bba7e9603fea8f7ce552a0f8995bbc808f0d7e4e5fe2c9a1879d39dcad95e43dcbef13ce9804c4ab1cec8cff9f7bf02ca0f79c730431edf17ebe72a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59990b71009e08f59030930662a93acf5
SHA16b03f42e04bc75c73c58c48e40c2fec0ff851fad
SHA256141e16d764702f9a6382283ed68de31ca998c32d97ceb67f95e8525590dd039e
SHA512158a8e39e49c2820adb2d6ec66fc1a5afe0ca1069f06936d5c080607bca35b78e5074edfbde203ab02da7faa4a336f907667c103becea8ff1c0e61f9d1862500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b403b7d5191cd17e5f5ee5c426370a1
SHA14e3f85dbda5f63800822014c709af0c921842084
SHA256f03b4ed870688b207ee46d2a2d792cf4582bed4c30d16e30b06d8ea3d8e36de8
SHA5122dcce6f771c35dba1c1121e1f994c651f316c868d00a1a12c85402447beeb3d9a8ec37415754ca5c59386dd62a47df38851bf3a55f2569cfe29da723a2e3962b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b