Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 14:08
Static task
static1
Behavioral task
behavioral1
Sample
e05899bcd07a84271cc40ae00baa116a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e05899bcd07a84271cc40ae00baa116a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e05899bcd07a84271cc40ae00baa116a_JaffaCakes118.html
-
Size
128KB
-
MD5
e05899bcd07a84271cc40ae00baa116a
-
SHA1
5e00039b746e9acf58cb489b5cb611141611a525
-
SHA256
e479c1babcf3cd2cba7590fb1e6c90d918a6940f84959eeec224d336433e78a6
-
SHA512
de18c45a10ebfb14163ea55716e8befd0bbb3e6ef7f1c44adabe03b815ce6df3b2711fa96aba7223873710438fd29625d38558bb11ee40489e530bc806a49962
-
SSDEEP
3072:S+HteLq4BfxIsAzYZVyu+6QscyfkMY+BES09JXAnyrZalI+YQ:S+HwLq4BfxIsAzYZVyu+6QsBsMYod+Xu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000019c075aa95024a1651ecd0e6ce47b7b95ace6b7b8f4667054972da924a76cc84000000000e80000000020000200000007cc76d849945a14b3addd3ea4b43609825d7a104e4ba2468cec240a534010ed290000000267175c91e7f401d22a51282e030567205ed19fbf7f5a73c98a8b4f5d4fbede7cdab2745d3dfa13b9a9897864c678c54876998596528095fa430df22325349d97e92205ad73dd15cf8440ab8c3b278f73b731441113b4056f94e2bfd4ad99b89a3620fe6554522b48e55c686f3ab6cf11e9d041c628696766ddcadfa1a957bb88d37c30d0c28f70cc9c7f7f67b56642b400000008902416a6299b9a5760df4395898e9e4231942d751de5f37513c295c6deb4ad0dd450c9c4002b749488e0968cd362df3b38e30f877c0fdd0a504b78628238a07 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 706777e6af06db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D3112F91-72A2-11EF-9EEF-FA57F1690589} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000009fec2f8fb7510d0edb95b8b1deda8f44c4c84788bf54a03b7559e4a73dbdf24b000000000e8000000002000020000000084ae1739bbfad2ffcc01dd57030eeb6e800332b752d0556b71d9d05cb03b75f20000000988ad2e2864c7646b696116a477e59e3f78e644daac7af9b68c044ce46c71e4040000000b9e1f6f1a5d7fced99173c359d50d0d01d13c8093b9e93f609f7fa173122f05db53782a3322d1dede383edb5dac174b8acf2ec47da7d21f39ddd028630d3a2d8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432484781" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2780 3056 iexplore.exe 30 PID 3056 wrote to memory of 2780 3056 iexplore.exe 30 PID 3056 wrote to memory of 2780 3056 iexplore.exe 30 PID 3056 wrote to memory of 2780 3056 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e05899bcd07a84271cc40ae00baa116a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD50895fe2082e69bec06768e7863a440d7
SHA1dd296bf1a5da412502ec4207f3fc0cf83d259dbc
SHA2562c8ad46113b1aa16d06f9ae533ab6538cb81241348049f0b2373420d89ab034e
SHA5126494808093e7c76d04028cf4f687bcfe4437b2cd75af98e6c0187955e997dddc26a649f1db51a5d108a5ba4afb563e9c82297313a7141db2a82a7efb6ee0bfbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d11fdae9623e822e4929ef65e167513
SHA15267f5e14b365a1b6686e264732a2b4c9c9c0752
SHA25645a46c9cf4a0969a83f380c7db29aec8bd0ee0d84b8eeaf165831817b937d7db
SHA512fc5195c57d56e6f895d2dc07c26079069067277f597e618ad2c5ffab6df589992e522afec85d831d3d8e82f620b08b2dccfe23822dd95726c29db0ff01453928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c345246019363b7c690521a7bdee937f
SHA13b23f2db777c74f150574325b32b2d56067695b1
SHA256374051f2140fc15dc0ce9639c6efb44a3e77179dbac26bf1e4d083e3fef768ea
SHA51222e5d83d73c5dff2b8978ab35dac1905f95626bc07b36df29e25044a30291bbb880597be97cd40482c667f8ab1612ce47393a7fc0c86fa43249893092d7af9a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa0e23b29d60fa151091994d152a45a9
SHA17763495a3859dfc52a4ed17b2648cfe2e3784a81
SHA25638d55a3e7e660f56b9fcb5702045f874ebe58edf8766c45ca8ecf2c26f237682
SHA512bb505443e0f8447a0281ad9ca1e2653e69aea046017530a781e2c6ed9c2edbada9d9d43556ce9a9471c48e8b1a310b4b727640ee5ac85000628124f561c8ac3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f76f12c96e9ef8484494e6ac44840ed
SHA1bddac27fe92c3d726eb199693c5bdb8c2b95776c
SHA256060c48041c3718cd732e22e2d5be7ba6015bec03b89029063f4eb9036b66b548
SHA512de91ece2dfc3958be2b3955f4eba47af3698b5ebba383da6426418d58c8a9bf4aa094957a48d58baeb9918e039f8d9340b7f7eabdf9f09b08d95d46b320fe66f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c75916388e7c68b78ec121b46cf4987a
SHA18d1e7f46845784753eb665dcfe7dd6b931782ca3
SHA2561eed7b3b10439aa42c39f07a69887dae9f8f6d99f280506f5bb1980032e3942a
SHA51255172f896912dfcbffe7117edf5accc6cb3e4f0b1e12e6410e0068980b96d103f591c9e79cde336d558cee7a9bf5469c26b96e515e0290996ea88beade9541ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501977e4f01eb9c63141f6ec980c0a06e
SHA135d3f17fcc652eb3923c96cf6bf524bc92b65c0e
SHA25689c5ff2ac2ce38e29ea1ea18836a750135234522bcdd2c35943771f45db7ced9
SHA512906e08a4528f304f2c9e2dfc55d27781df6ecaf2efdfba2bc52709811b394f828f95a93796b77a94493fa26b69e2072e6c34ca4e3fb2d1a775294c6f1e04a0f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee9297cb0d8ab286370d54e2b35df406
SHA144357ca02bb1e5118f9864940dfef1fcf2df8744
SHA25607d607066e8fb878c1c008a3d568dff49e22bdcb5dd611918c51beae8cda368e
SHA51217e9e0ed0a99c28b9d5f5db8333c0f6f667ff27d8526ba77eb38cc3a29c16ac9e601c8b5aeaaef64aee871cc8971947369df84112298af65f60a4d83d6253491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52688383c094cbb441ece5640aa0d2d54
SHA1c165a1cb75c15b38f7056985e3132550f72bf74a
SHA2561caaad3b6c8d5cb1e16a4c3c77ecb8705eb510aaf5a6cb666d13345df79a1569
SHA5126b0e9908f36b946964b996118bcf4e11e377bccc3c389faaa222dba2d8b4397cff3772dd1a4fba8fd6d06861a781b95504b0b93658556ee106c7b0aae43e1037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5213880f66465dbae5aa9747f913a76e5
SHA11e43bfdf91f0bd3fd40da4c8a7c6fc75f09d84ad
SHA256828e69b7992f7922674cf872bdda51594fa26a30a829af2c853ed848f0196958
SHA512f7105e6c42576aa08088238c19d960a34f21f248b62c369fa449396327d27916071f1ed6aecd28ded10b2a1ce95390155e47d3ab119e772c00d3c07983b18f73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bd07fe1e666d36f1d39db22946d9d6d
SHA168f36198a4c9b6921956c9b93093ea5571d90733
SHA256c1ace3e52edf4063fd250044d892e204752ef10f9c958cdd4f03984d37c4f3ab
SHA512c7a4a3f3485868e7ee23b98a7e109efe0a2c8accce64cf83dc05bdbfb1c5d6c1192a62615b99062ca3e841eb0d3f6c14c422f5dba1293a7f8d805ccdcfe40802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5508ce65079edaa389cc4cd217e8907b2
SHA103ad5d4b7b08c8ddc2def8557fbce4b2ecf837dd
SHA256ed0a5c8f439c67bd848df03f7fde21e883d9636d8ed8e6b352bfdd7f16907dff
SHA5125df1e252a78bfb88180645232c0b647952c356e812216723efc370738963ffb061e1ac3e1897d8256d4f97b0d32f73f321411e042e063d5716f99c84d3f2a958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5162c42e6310e3e3ffad85c067f101bec
SHA1c694e747beff107489f22992253cf9f3c6d787c3
SHA256ab934532b3560d4ce171dff8c679a39348a85145df44bf6a84da7cd9866a548b
SHA5121a307d9d15653e979d40f04bd55b315bea2ad064a248025f832cfc4923d654b5f02d03c5d5da14836f828714c7a2112ec3a77474df5788306cbd9502f3d440fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e3b9c9c62529b59f14697c54f0ca9f5
SHA18b4652ea965a40c49ff6b7404b91345e7fe73b20
SHA2563c91b90260926d12f25bd96988b6ea90db6d2ae6be0aa97d3041c521ab13abbb
SHA512e5aa1b972fa00bfb2e7f9681457676ef269ff46a71c2538da44a240ea1fb452e1da7f91c8c2971b788ed6a7ba07a1d581a05f8d1c39726ce3b0bcd03c0587722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513baaa553a58d5e5569993c962f9d20e
SHA1bb881e7410c7addb78863266acca145100451c35
SHA2563f3dbcd6855a38cedfbdea88d3cdfef63f182bd721d7624323e23357e18b14a3
SHA512540c20ec2aec0afe4c68bc5f620c460a1a13cb7fb04c2075617ae2d8154ea82203465d2fff458bfb4d0f539f34ad266da57d194dac4c0a95f168d39ae7e9abe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5deeca33883f4b44133c5b9dce2005379
SHA191cbd514513e1b238ba82e43fb8f4eeeabb6771a
SHA256689e125d8689df24bcbc2fbc156a13fdcae24dea11669d35abc73182c8edb8b4
SHA5120ff36f510e6aef05493a31aab0ddc22853ec22decb3e040535cedcd495c3df52c7463aa997ef3926156778d15dcdfca3ea9ec6f8cf31e80312743b46fbc34243
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5aa7eb5e1f311d658295c13c224b9a93d
SHA1a9944515fb21ce33d6faab47d5a9c9a6d91c54d5
SHA2563f6691caab4e37af57c52e45e594d41ccdda4e7d494d841cdcb9d12f347b6521
SHA512c74eb9f9be53acb4affac44d72fd5f4929b8348e6abc7c143ad9012acd435a75dbf1d60f67a814abf38b992da04a7ea5487f68eb38a8e1c5e49c884274fdd733
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\mvf_g2[1].js
Filesize24KB
MD53714bf65e8e1251620432ea9497cca2c
SHA163e9c954ec9853923d780178803fa3c7b380be36
SHA2560486b1011f29c20d6731571ade93ad75b6a8d6906fe8b8fb79f93ef65cd5ab40
SHA512ec39b31bad7d91fd47550d044b16e021815fff7914eed37fcd5657192341391bb592ea233419b5329b0a8cd40cc173862482f4d4d7f44a6c787333ccae2bdc7e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b