Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 17:21
Static task
static1
Behavioral task
behavioral1
Sample
52d2e24ab0647582ce7904f570e3ace8_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
52d2e24ab0647582ce7904f570e3ace8_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
52d2e24ab0647582ce7904f570e3ace8_JaffaCakes118.html
-
Size
43KB
-
MD5
52d2e24ab0647582ce7904f570e3ace8
-
SHA1
3390aab0d35c567fef6eaf8212dc7ad5f5f837b3
-
SHA256
40aa87c1887323898b80b6f0f49d6b14171b98433647463845f8c4c154557dcc
-
SHA512
791d1fb81601d2b96140fe9eca05a7ea20a59c8bf03107fcc713fdcbbacc2beb53d40569544a252e0cc0b7a5f6cd81ad45e0cb72c64ed031357c9e42482ccae0
-
SSDEEP
768:qTpjaIQcT/Ig0diRbsTBi5TEF+xT6/ZzKQh:KN/z0diRbsTBi5TEF+xT6/ZGQh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000005718c5f32ab22274d2a73b3bab22ef1b513d0e1dad7768b318712a4f065675cd000000000e80000000020000200000008c9e127ee30310c3bcb85e1299ae22d1b3b61a5439837643112b09c3ba628d1090000000cfa15131676a7f53e40f4e48379a2168fb3c70786d38360540c805cbf870d7cef16de255dd673ba9ef5446282720cc1352c4c3ed1fa2f3e1deb002d028642655dc9c80432b84868f3e4effea531f89206ac1ed6e043b7d85959f5a4d3fc588249786d8bf48363196dacedafff57ffa511b5e58beeb01f21fc8f82399eb0df184fefca63a2e1cd3e97adebab534e3979d40000000defa932cfa2af7420cdf383140ea219e08dcaa8bf93d6982e8d818aff51b3256035627eeef1fcc92b4a13249b21fbf46f0e0f3db396438df1c89899fd4750d15 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435347557" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3FB52391-8CAC-11EF-A429-7A64CBF9805C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000d56b6c006179ecc732f228f9d28f54a4ea0a9206412332ba3dceb7a5bfd8f2df000000000e8000000002000020000000e3cca8107ccc7d9d2cfaacd8f700748b51fb23f5335190ea13951ef238c7265b200000004a173eb95834a08ecc5be357bd37e1cb670b95bf8157536d9a048efff4f1f93b4000000071637f11546d50b6559588f4b189f3e6ff9f75b01b8d3cae63ab72580ea07740bcf8f9fd33c06d3b11b4e11ff9e998da8970b169ce4b7f6d3d45908b7dbfe159 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0114314b920db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1520 iexplore.exe 1520 iexplore.exe 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1520 wrote to memory of 1964 1520 iexplore.exe 30 PID 1520 wrote to memory of 1964 1520 iexplore.exe 30 PID 1520 wrote to memory of 1964 1520 iexplore.exe 30 PID 1520 wrote to memory of 1964 1520 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\52d2e24ab0647582ce7904f570e3ace8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1520 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8f665f69e2ae43a1e54020b45388268
SHA1a83c29a0476f14132d9ce19a90023b3074ba220c
SHA256c558b3d558b8b7dd5d434c8ec7f4b9f38350323c58eee46f0e3e863729fd3aed
SHA512bc043066cabd0616ddd7e788b9bbd4220bb6b2f4ab7a51aa33ebb89a9cd5282da5b1bb441f38843f8da9425ce5a148473cf7c4f8f9b048a59557160ac26ade73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4c589095332668f18f567deaa435876
SHA107fb3043c21ddc34abad31d96c745043ea31b1db
SHA25659ccbb593fd18918cd0ae1e4d188df12f550787022ea67ca123299b19c1d8880
SHA5124981d15eac5f40c26e57f33d79670e40062e6a462e235b2b326627769e9c6d8ab2b6830627ab5106984e6d8898df863b26986936a5911ebe93ce683bdaa91d9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd9fc961e53f3c157c75db0252df27f1
SHA10e9c27628afcd809818db3a49b49216b574a7f3e
SHA256d5338bdafc07664296d7bd23f590c3fe6dcb980b92cd50e838eaecbe9e0ebe6a
SHA512b906eb12e11382622c4579209e16b959dc3c0180d9babb75938cec4525bdb41ee005900ee4b1229106270398e0776d248ea0e3ad047f46f5a2720da653ebcb07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c94146b41666d8fe368411934e368f84
SHA114f6c41c5109852cd2822f7821065f09ca856b28
SHA2564976e7d80e71010ee8a0610e18422bbabdd88bcf435ffc10fe7a93cfa350b25d
SHA512ba51ba0a17b8f96f639aeb9fd56986dc815db427422ce0136d026b88ee78b78e21c22a53da169945467e9506b54e9ba387a465c5d015293f98bb853af4b46c36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518b5b98f763b7e5c6452c268818c67b6
SHA1be2f726099b6fdd83d4c16e238695c6db501a641
SHA25688e836fcce324a7d7bcce58cc3c6c2c1d21b1a7078325c5404938ae30192e6e6
SHA512e6e85f35a1e854503983b13217e9ed1d913e30fc91635414c76e72ed9a97f737801fc6fae7a1719a4b49e4a9c30e9c3d2a80edcf08ac546d6a8928c65def37aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574eb382d42e557eb855f4e61fbd0fe02
SHA1221a969c2555df2b34a24362a2c03b7d64a9472c
SHA256118eb6743461908c9058304e325f9f60f04ef318df9715415f450aee2d3d56a1
SHA512717ef185b2be7e6c327cd2fce8d4bc8f9a475a554dbdba41a9b39939742eeb6eb54b2c1f70b58fb5c34aede9be9680a87ca6c23ac8c684589d8339ec29d739ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b95f0db7bb420e81da3cc9287486919e
SHA154c6cb05308d1e4911eea5d5fb837fb2ddb71b4c
SHA256869884c1f86036d04cd64c2614df6d605c6409bc3c83609a35a0465dd029b523
SHA512e7b52dbb4a2a24fc3add8730d09049e1d2033a12226a503c22639ae36a33b0e0595bcf895539d1d27da326c2e7a2b328783f1e75ac121dcaaba8918e41bcef3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff5627266649d0e9ef07c593ed216d94
SHA13e87b94680125c6b83be8c558d58e3a91dc9710b
SHA256fff6c1ae03d07b6a62b0859364bd5e1be0442ae4925faeec2c30702b3e4fb2bd
SHA512096319979912c53e75118eda2cb0bd5ad07e632e7cdab1cea51ea731efa29b5b5d8680c5f6bc4ec2d3ddb5b97b6735157ef3615511efa075cd29eb3a07c96765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f91c570370394df244a0b3ea0c27b17d
SHA1d0906dc6e11d323f0e004adb32d72be8fc5c2603
SHA256cc0f802bdf5924dd00e9c6b6c51e50898296a07e8f6c8eb54b0033c458ed2e7f
SHA512159c559607b4122cc70be2900069dc36d9c99e8c38f0e4d68fcfa82b447c10872077312e52114e979ffcb49fb0075c6b589cb8bc994741af362197091c3bcef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f54aca6fe130127a7f634d19289b808
SHA10cdda3f01713394e151ebe993565502a36f64152
SHA256d60fe057b4f3094cf0ae8f764aec5cdf8de636320b37f027b6a131558df599c1
SHA512097183898c31608a9fcb51f1899e1c674d4b3fa25edffd591e6e84685d597abd965b365c13c99424b919bf72f13c5f2543ca21aa6e81cf6ad5c4a39a370c0d5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dac9f90eac13b4ccc75b18923abaf25c
SHA1f8aab631141efebc036a43f928e37e8b3fbaf43e
SHA256ca8c154823a0f845513be7b7760e7237d7a4cf9ded9002f255a68be297360572
SHA512ff9565f2ee86075133101e5f3d6c929857d493a7ad85615c723ecc7222fcfebd072b3b46b296b2e56de2708123210362c2c72215983360442221ddb9f98c2c43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5933d2ea9a73bc20c6c510199e1726a39
SHA145aa5f08785866102575119cb65b79d512f7989b
SHA256316cf836785b96ad3135d95f2471508c38fc5777ec814c38c70376dddf7a356a
SHA5128ec12cf3106efbc70af0bc0400ace47e98f8caae6548fea4e035b32b10e8a9703a1d938a6d6addccf54794655fb7954282966eaa15c841c7ba06c4636dc8af51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57846b6a74119b0cd0a7e0c22f61261b0
SHA19628c10c7349ecde389a003665a1b51b08b213de
SHA2565abf8a9c387a35f7124fff0052acc7d0cfbb6a984e0dad53b352787f845a0413
SHA512be3abc99e6a813a46d285fbb704aed9b14c47109c8056f2e512998e53ec1f08968192148144a5acc81bc638091d39fb72b7cff1f5672bf23abf2230fbb63a92e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5961bde8bf291b7102509b38500301335
SHA18d6529e7adbacc5addec29a735d2431b13053130
SHA256b8ab5f484740b0129021a8f0a19e89ed2d5861ca902f7f93ded044af46239ca7
SHA51218985bdf3591f3e9803d7a44430d80057b06064aebf557fb08e075b3cb9d4f7723aa49284f5c632d9e7d469a53f1eace9ff3c4075951c6605985a601540b544e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecf746115ebc8d288aac5306248f761e
SHA1eed08768c04a8ca49de579aeb136c1a2159b9fe0
SHA256737ff1e2ddd0b28b2adbe3381b82f2b12125cfe308c42238ab5e6113fb24f597
SHA512dcec546b81b7d26229ce1c6b2b5ef41504561b33060d58db12b3cc3c982c5b15c43b36eb1299bd2b57242985c146e039123d4a730844788ed28070d5e7a7435e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568ab5bf851b80da227c62ae4e8dabbdf
SHA123efa4ed395fa14a2a9dfa423c1fbbfc40c6a376
SHA256317c02af9c0e9af4190abe465e58d58ca19382cbc3dd13b156683cb80d948b42
SHA51275869e9aaa997aff593bf9062b729be3490842415bee4166ef6db98d4fb038a04701e7279f91cfb5296a8b36562f16cbcb2b5b8375810f373c964b403cef1426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a02ba43ca565a148c4bb5196af98290b
SHA1a124ab2a955e38db5603ed09fc14953df7af8ca3
SHA2560fcef6127dcab274723f09ca2132fde9c6123475a8d1cd351dbcdf248e06dfcd
SHA512165cf0ce248764e8a3e722d4035c510f70ce92b409f9143db2eeeb79c1fce44b14e89e5e5d04ff043fc53c1a97105ad95ce26897d153ef22068049fcd35e1b39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a065967ab0b48d26fcb15cdd960ce8da
SHA17f5a1f9946cc5a96498fa80db66771ded3c7d5d1
SHA256ba35937d3408c57e35a7c18b1b28d0f5ce456d9c24a8f33b8d1b9cd0d876bb46
SHA5128ec2e8c8e3a86d4b17f417c2002f6a37100bdbac7470cb71c8735d77347be307f22ef462c5c4efbb3eb6b9fcbac287ddd2f039d32b517160ed791ae03e6beed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf3cd4e7d6e342cf4f3459d702212238
SHA17c5df9110f30ed956d71860f41e0878cb9671782
SHA2562c08f5cda677195ee065586837d111dc818ccb54eb20556cbea3475d48e83625
SHA51224f6971a1e642622e11af66d3e444c8c2e27f982ca090e9ab2fdd05f51e75f78343afcabbad599fdb38177151d2adc04d56da707b01339d5744fb8ff25304f02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c64cff98bebe37d4760339bc60c23932
SHA1a3f2b7d341ee3800ccedae141f71047c410d3b7b
SHA256c4b972c9b76af908319ea3eaafb7c480d7f12555efe0f01a322ef4fde7409d40
SHA512bc756132dbdf59f62f066c337e9e60231f3bfc1420d0990b5e97d8b2f0460ff760e753117aa840431ccd3e90969102da41fd43c686729a6b592a5bf0b3875968
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b