Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 21:01
Static task
static1
Behavioral task
behavioral1
Sample
53b7399b3956cb2f135f075cb63807f1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
53b7399b3956cb2f135f075cb63807f1_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
53b7399b3956cb2f135f075cb63807f1_JaffaCakes118.html
-
Size
139KB
-
MD5
53b7399b3956cb2f135f075cb63807f1
-
SHA1
d91855a334c01af6555c1bfe0172ce2db16a3233
-
SHA256
0d5b3e05a70b7db219fe90bb6fe5c88bc5385ca4fab9abbea4a87ac8b2d9b94b
-
SHA512
7a98b0a425e43cf943054b7b97fb73c8181122d2c321e406af7000a83c1d14b9343e4901c2b9fa922d3e0c86fb2b4f6f70f956cd87a84fe9ffde8a88ced24fec
-
SSDEEP
1536:SQ1Srqbt8sAEtSHyoFVqFl1yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP06:SQw4tyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0391421d820db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000054212b12218537d0c90cc51d7cd5dd7ef833c381f95e9339da331aa01ee69e18000000000e80000000020000200000003f77699d77fb49050033bffba6cea7224b1087662816c6e38ebf8799b3ca45d620000000f22d36bcad0f82e4eddf66e51aa8f920b9d2da284042df332e7748a475f5694040000000a3128c931cd1334e1f23471f0cb47967145a427a6e2edbc60f930879697b1c02900fbff4157d25864f5dfda426280f8d628a071f6b68efacefbfb62923dcd4d3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000d9a359bddf2f8d3b728031253b93a4cd859af85bb13ff70b47181f045b79efaa000000000e8000000002000020000000e994921cd8cc6175a05f2fc58ec16eb6a8cdbcdc6ebf3bb2f963fb849af9cb3090000000b02080de549380446304e4d1b581cd60f83fffe8fc6af8e4dd17570588739821ea2a1615f4cbda0cb8f1e484b03040fa75beccae1e52dbf5c8eb5a30d30f84dcc8bf2f75ff0482fdcc589ac1e5d022676c0991995c8c20bdfcddf97d2e8bd873cec270069a2d01cd477b4862b71ffea82a37c1cc7f288352b1873d1b051c6ab1cc9c0453692bae6f2a8c907588acda0d400000001b31b6ffeb9c8cff48b153edffead6d1305dbb203629cea576c87fa23c96aaf8d839e15f4a444caaa3f618ad072e904c88e7ac6e50daa064b44695e1c319e841 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0B06AFA1-8CCB-11EF-B945-527E38F5B48B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435360784" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2228 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2228 iexplore.exe 2228 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2812 2228 iexplore.exe 30 PID 2228 wrote to memory of 2812 2228 iexplore.exe 30 PID 2228 wrote to memory of 2812 2228 iexplore.exe 30 PID 2228 wrote to memory of 2812 2228 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\53b7399b3956cb2f135f075cb63807f1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6347b75985d4e825013e8b04330b321
SHA168580839e32da34dd96acc10ead3b3b27c81f66d
SHA2567291f6cb6d614b15fd4801ab2f4fd32e2851ff4c5495995d7c5cfeb0934719d6
SHA5120c8d64cc0779a998b64acf8fb6eeeae4bba732d7176ceb5832191271dbbf162ef2167df1d8e4d7d5f3b8efbdf86777882d075c9f87d42780b5dac34f82fe137c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a7a9f85d6bc34839755a41b10416460
SHA104cf834bb9d77939119434ac8c6588ee9c90522b
SHA256b63994843bcf3b3017b6d063f4753b33532997b022ef2535709f5ed23c3929ad
SHA512e72400b1e272b639e49e44724b7b41db630f74fadad044cfc794bae23cfa2b28d9a6159cfe9779c29f4fff610d73017e1e40f8718d45be9edb2612403ba7d078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ef9866ab7e9263853c68df0b645d8df
SHA1ea332666258ef7b1b9109f5825bda1e93992f69b
SHA25611a7962d941b798bab5cfbe4ed1514d159297867a0e361d00228c70feb93d382
SHA512226abdd2f72e0585cf5d15232e77477e6f02ff4847faadfcfea17d8cf146b5f7add83fdf5c751570f1f7d9c651bfe336295c6525229f523a555602990bf9821b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52839e1699e6fc7ebb50b12639243d061
SHA1c9f1a061664e84493a0c85b673460ad8a31d0ac9
SHA25642d0bd5556ee2d82cd5ebd3ce433c38418233e60e530e211e87f183834f11c1d
SHA512af12a70d5e652a897c7d9c6a9713a437b11f58d1278f90388c34b7ea4ef7c0eb87e2ef735e858d258487a78b9cb534c4ab31d4e3683c31de91772db3ec9afa30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5794b7fc172c399aed43a5ad7058d070a
SHA154d746eb3b637bdc2e593a1f7aaae2deced54990
SHA2567e7c935215bdd8fc7d2591b1f5dd7334e62d71633beff3e8f68ca2436a219866
SHA5122f0454e2b77db563c41b9a737ec72b13e4b6367f91e5b0d7e2212ff5da76ca8f1f9a3ae0abea63bb17546f69ad75a676cd14bf46f3fbc4259a4c9c3a4acd8f6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c2383af55ec14e676069f740e82646c
SHA12740622715b86c6e268dd527e02938532f26a803
SHA256bbcfa2fec6132564a2761159f48d1a8e092ecddd0dff38c83ad7a8cc1964677a
SHA512bdf1ef75477bf67d9aea3e7fc44ddd90b48c815fb66f8f78bd52ec129e5831d1b47583b284e87236ca65c34f34108f11c34075f92e0424751b6d0890b0d8427d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5341428ab25db1eb74bb9c486c495d5c4
SHA19a0006996d963cfa0ecad6eb0232e2a8a4e4dc5c
SHA256046f2f713a35b0d8c23bc7d21dfd8ca150bcd193aeeb77d36400b92ed76e2594
SHA51215770d2e793c3567ee454e3e0833579ad3b80c29afec5bcbfac7f3d6e15cdfeaa6c8bfdcb4d7f1691308b44e194d07918d9fa0c0fdb92eb2496e57bd40b066d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b894321ef949c42630686b147bbb2bc4
SHA1b24994ef7c0aae72b142152c385d069982019be2
SHA2565a1828fac22a6f78568f6e07df37b8658395b820b2c0505a3409aa3a5aa25d16
SHA512decf5350abf6111e20407e531b1a904e4f94ab083ffcedad2af4870ce77448bc38968b632f2df570950a9a90a2283bee9133164f3542848b0eec0ee0fedd8009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f3b19fd595f4c9d9a53c6a0856a6dd2
SHA1533a6f384293a0988d19d3a1c38b31803f7067b8
SHA25689a8c6bde02e648326a196ad5f35f0aad40fcfffbfb9052d1ed18028a770443e
SHA51210149af7c514d65bd288c17da20b1f2338fe41bd2664662009010ba4d349f1f09b1387063713a1e45c042e7ef0d0d3fec3335077ec757e50780da03570ac9e24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53988331661990780ffc2185459e423d3
SHA178ca9b24a2056c919c4dd75abb6e222d1c9bc6ec
SHA25647035fa5caf964b5109fe782d273a46256fbe6339896c122632437a4755488d6
SHA512b76ef62b767db7832a26e8c4d0cfa7546ad705ac32324428b45c0bc152482e853449ef05c1dead76b05347146f51098c82ab4a7d03e063b6570bf39435909712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572506e143402b5126d5039650dc6369e
SHA16a0be7ddd40ce1ad86439b92868d55d9cccacc35
SHA2567dfad14074e4995035fe537d26163540c94f8b3f45a31c14c12ec2396c522039
SHA51244b06b0bb46730dee7a069746ad5b4e9589c9aff56346af1f26a289749aeb6c5d80f46b3ec8ecd502fac36800e56fd3ae85a9f13187cf7ce8ceb16e586e2c0a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594be381e141f2339896e2b45ce027657
SHA1bae05f3285c08c755b6152a70e60cdda7629a9a0
SHA2563be321a7a122b140a37419e5c21fff97ecd2a39629157a5b4d33e317da94e021
SHA512b42ea6aafdf2716d1faf571410c33d1e25ac69ead5674e68da3cea734409ec1c46718c72ca5c294cfcd47be3460b8a2f104dc54dd55343afbf04b8c6b8af55a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b7180e6df89d8187133ed9e31d2c96a
SHA1507327e5f8386a9e22254786f612f99a0511423c
SHA25604d6b986909d4540cba2800cf661f17389c4ff5e3526c0434e02f479155f39fd
SHA51250f7559d4d1ace90272feb6df03f164223c9648533475f34780d3adc7afc20d3f26702f6ac93f86fb61d3fffc0820f0558c408676e003c06a53f0c0cd8335cb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ed8af93363e32e3bffbabec5cd04fd1
SHA110df0093eac882c4a5667d7894e6d60f7ace34ac
SHA2569aa128b6c4cfb289e7bceb8a5df23edb7f09121c9ed6c12411ebd9507ea3270a
SHA51254d6245f88995435d89ff596ffc879f1199a9ff3a42c25d8058b0567ba7a39f0c03c54c1306caf7c24f4484977d2ce09e06207c9840800255bf65c2a3b5f69ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b672bcddbf3615c1c2fe721c94a15ef
SHA1edd442f28d4b80febbcae026ac707e8d7d56f231
SHA25636b5f7602ff01cd35ede17635882e73727e9e86cd163992f74504be6819d6baa
SHA512cb88e7e71e81d3e5a3512f023ce41f94174e5a37a7c52d106efdfb5849b80ce71fbb08763e46fbbcb241ce38ab74f8d55d8e326e22eec75f5fa58707babe6420
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5099efd9a6e0f3bc27e6bef5b1500acfd
SHA19d55f8571d7d11f97e6f2dd90edf58a01208c525
SHA2565b429bff3a49ab4630bdead2617e39c8747902c2b54a10da50cbffe2aba484b4
SHA5129aa4b7772f7609ed696d7a611769c67843f1fc7bf4917c51413eaeebc650674c67d08c6bc333a7e51ce4241598ecca5e57438d8b16a162bf28af25c831cb0d41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5e311f9a55ce0b0faff2c3eada0ec89
SHA14dfc6e3b2e151cf07fdaa138c9cff740a49d4707
SHA256c9c29e7713a2b6efde4a376df546a5d9e5748d79b211b83a6b4512344f992332
SHA512b7e3dec5f1e8a0912d66d5ebddc983503d62a14b9e37bc80041ca3d06524e44c05650f567dfda3445d1f9c29089a3924e5136d9bb96cba0ea0faad98d0baf8f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550e348037ee72b6466b28d36a83d75c5
SHA1a5545737956815bc406a5daccb434a262d48b939
SHA256c2cc9c1624a741d18804783a016a24bc241dc09698dd52f707b1d6f637a94cc2
SHA512fb0ce43a5f0ca8bfbd639712e75f051f01da3c215cc7c8e7ce03f2c94a50f2dd428ee595306036fa3b0180611e881918e091a8da68ae1bc7fc3cc3517124073a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b