Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 14:12
Static task
static1
Behavioral task
behavioral1
Sample
eff78c7a1b168ae71cfc64ba748a8bdc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eff78c7a1b168ae71cfc64ba748a8bdc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eff78c7a1b168ae71cfc64ba748a8bdc_JaffaCakes118.html
-
Size
27KB
-
MD5
eff78c7a1b168ae71cfc64ba748a8bdc
-
SHA1
f3fa04b3dee410000a5b6130f8b9bd4f6910ed25
-
SHA256
9ec98c125269b7cbdb52a6e404b6917c93d00e5871ff7d481c9dfa38e2e228a0
-
SHA512
361d048a44953738e41a98fca9326685f3d3661f5fd0fb8737c1e2d3b05ba6ffc3fa441d1e3e8fbc537223bd5596659080ea9906a87c7e09b53410c282da24ca
-
SSDEEP
192:uwHAb5nVmnQjxn5Q/snQievNnGnQOkEntcSnQTbnhnQ9eTvm6uvNHQl7MBPqnYnE:0Q/ECRWN2SpE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433089798" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7DDB8E41-7823-11EF-85C5-7E918DD97D05} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000ed9cd535a37fc55c762353690e794039600bcf8a35a4d80e3f280256a39da640000000000e8000000002000020000000d35e40131251901c19dcdfeb5ed157b16912913b85afcad23fefa6d5454bd75a90000000a56599314a3efeec28598af299b1d7b68e06b657f7de4d13113d715ac22ff1ef27d327c07dd696e0cfd6314abbf634d2fbffbd4845ec0dc7e1a2638b4224718f0ffc82d86ce802d3e3195de7e855b2c2b44ef7af1b410dbd3c94088e4bf4a77f3426bba7a45b5155344f90a5321970851466966170201aed13f96eee53479f1e7b1054d27fbe8b73046af80313d10d5a4000000029e2c3e344deea6488cd45652adb2f8790d90614f0322572fbf6ae56a5d33d55df6ec1b28c0581b438243554b7ec007ace6b02a149accd51e2992d9367922beb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60991b54300cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000005951e490cc3d0a38cbd7bd5d657310368e4c719860bf0bd32d52a3dc0a6e33b3000000000e80000000020000200000002db76fdb05ecf53ce967aaf3877aeb3a092737f76e516c04507b19f641737d7b20000000487a3410f2f3a8a51745c5ea70941e90efa46e0b72f2057685930017eb2f5b9e4000000056967d6d2811ed62c278e96d632226496d5069c204b28c88b60ccc19f1a103a76880ace41214c3b8982d9b903a05170247916730458bc092e06db2ba572dd7b8 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2704 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2704 2364 iexplore.exe 31 PID 2364 wrote to memory of 2704 2364 iexplore.exe 31 PID 2364 wrote to memory of 2704 2364 iexplore.exe 31 PID 2364 wrote to memory of 2704 2364 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eff78c7a1b168ae71cfc64ba748a8bdc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad21c688744140c49fd938649a1d24a2
SHA17613ab8a031d7a2f0f090c131e091ea16beea6cd
SHA256a1d477473c1741399997e428411cc3a58b7509d7476469e3b29f85c93200b046
SHA51215fe144588d8bd309df7af4aa80c49931e2498472acf4daf2c165839e226e70c7018c11dca07324716952eef3387b9d74bd6533119e1029095e029ee6feb11cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5686265834ce922997efde544149f2024
SHA16ad0ef851233f1b0ba2454f0c52b600723905135
SHA256aca5b9d5b2021a795f83c91305241ce52742c03aadb02605296236f6fe7577c0
SHA512560a996eb571779884da438416ca9c6a2fbc52f99b783eef3be5991e78e5f9aed1b7e78b6c966be7366edecd0873560fe6bd698eace90fead978d422a4b4b92d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8b4589216399fda08ca19494eddf28d
SHA10c1846b1831232572fc8b90d78871baa5dbe7171
SHA256b89eb8d71c692584ca328856811854549888b465e61efc9dce8f440d3bd06f20
SHA51225dbb90582df758e0c972f8c2f2367939714a88beccdc98d5ca0cb05749039407289b846d8512815a0c72d13c50962f96563949df2d96a1f2ff1bb89ba6aada1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e75a9766ad8fa43e4767654f362ee201
SHA1970a0760fa276f6fa47b4ae8da4376a64ed7680b
SHA25670d3d468d5e959e876eb6c7206da26b5bb9ed80ef8cbd725c38dab64daa376c5
SHA512ad4f0b35ce1263e1f00feca1d5423d682bceee0aa0453746032e3468c91bf0a52a8d5d5dadea15d01212af9d6f9195c1b1af534e564e5fcbb3ef5ff9b5448b11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f7d6deac9d8caf8ee8904caf55febaf
SHA1a5503bd2214ff4d936012609e1821692b898dff2
SHA256204811186ce37f4a72e53cb229b9399dfcee4a315c75ac50c85d507477917653
SHA512c8b83d024b53860e638074d672bb818131735e73a01b19233576e2f62c48d5445c3b434ac4e59380d1d9b3dc99f474b6c4e86728ee5b3dd913257e60004fd097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d36706810258f6f65f666711fd5ac06d
SHA158c2de7fbc386dcb37746dfb589c8bcb8ac069d5
SHA25646908a2aaf2bbaf255309cef15ff41c4981ca3a868523ec138d2fd295786dadb
SHA5123e0d68aa0c0d18504a815710bf70c910eae3ab84f3c7c1715cd7589d9db09910b24df7fe56afd47f2436e06eedd74b4cdaaabc19549b04343984d391a9063eef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e0b82741a34ea95bb6e105c9f5a44a4
SHA1b49afd3aaa9de783856d886a9a3faaf4afefc90d
SHA2564150f242afa85e134fe345bbf2c60f64e97c510fa5a3cb35e6ee0a939dd1220b
SHA512418b8ce30d1d759111b3377a6d2a15bc1f180870fb39e149dd0534c789135d4e345e6a0c13e1236e26564b293fda02aa9f770ef144031b1cf9d131b969b6e869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc2213da8716d10c915c7ef7f944c1bf
SHA1578f6c992d3c9ec7051a1dea99187edd9c434212
SHA2560d5d50b098980950c8ee983453bf36cadd679dd7d7f9c1af1ff401b773140622
SHA5127717ed8ab1c1072b2d0288c5efc7fa3c0626bff87cd647423d7ee1d1c92c177ad51bad6e88c41248e324346a50193971cbb015a488248da9007d7dbb43081aa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554972a1c61c0e22d7cf2918b7e0ba932
SHA1f88d978613fa3f28b426666276ef6f57f63426f4
SHA2564d517f7727f6122f87046b7b379bf12f64a34b37300a16e51337510e4afd9533
SHA5122527bb667ae42b89433eb7491104eabf5b2272cf9b9fe88e04c5e436c4b343f880e1a2b566ee9ede709acd929b421709bd4cb15eca71e4982ddddaa72eabe288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cfeb2d9825df9f3f26efa883dc95de7
SHA1ef6956b0d297509a1f5e7ecbfe56837b50d8ad91
SHA2560b2d19fe945c40f3ced1c3530b269d6570def284ad9e9f768d1ac1a2109c120a
SHA5120563d5019ea1d7de2f094e59cddcec0e9d5988aaaad7c8c7181b859a743c34bfcfd86828a58ec87ae213a8db956d52c4e56b7a7b7277c1cd9fb2d45d0ea5df95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554fcf40fa5f879f523fa13a8be0e3273
SHA173186dabec5fcb692c48ef177397310ad73679ec
SHA256d4b5db0b302029940925bef438c33b45f1afcb634513ec1f9d527060681e3041
SHA5120c04ea1e6748eb113402c620a2a80f47c75abb9f3d306c34f864bb9f949fe957c802092a9f75f61143b62b22355839f21594494c717a91a2dfc3786328b1fe87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563ff444d2c6075067523bbc7f29e6d4c
SHA1c41b5d6815c45bc11a4844f9fcf26ad1d9a2d697
SHA256b24d62dc2ad0811bc62709e824309065012bfa79b2f787f35ce00f7ae6a608b2
SHA512ed0e30033f2c50a4fb8a626e90b824a6e1f4be95668613c59659ab6a7b70d0636eef9a3eb24a92c93bf81cec7170a1a9c5967de834fd0b4cbec9d4917bc5c4c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e850d1872d6ac392a02f49f4160379ed
SHA1ff83a2f938557850807fd8a540cb8625d0b2e0ac
SHA256de7190138c7517041004d832c8ba6a4e9acc7492d36e7e07d10f37a62e236ea3
SHA5129bab3e9fb2d1b059c62762f60041f2ea76dc12f979c8a4fa4247e2b7127a061b905ed83393e767997ec86823231f67647a42799a15cc8dc7798a2abf808f4a5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5949bc25bf58896b50505bba49b640e5b
SHA1e67f4a88b3283f942708acbc475db1f7c4767258
SHA256c8d12d9e116840f42850e72c6bb26b5f0840a35f4636fc99f02f5475678e574c
SHA5125211e30523d01305a9fe26db0a1e2688849f37497face1c47766238e55fa2688314e089cb20b489370fd95e9d8366105185bf88b903089de5535e1a5b7228ea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9c9989fe93dfae3a161076e3e9c7f44
SHA1271bfe7c6069d4d4db62f200d95d1e86b27e4120
SHA256fcd88412af4f0e36615cdddc2168df937edf93db4427e7d424b059a14c03af9b
SHA51265c2a5ca3400e4b90a387ac0e631e15eb592e5c28b68bb3f404291890c4407ada491b20f89991a5929ffc2bfe3ea8b01fb1a526012eb0235673fbf2ef47511e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f1348ece7a88fb676ad375ce3183006
SHA192825fbbbc46d8496c7cc895fdf4d84c1f1d6d68
SHA2561620f226875a5345ae750af9d98aed92d99fb74b46a99918d3446c0be565d629
SHA512a49dc24b09d4e6161beaf7ac42fb023b979d07b0578563e2ecd9de1d553060778e101bbc7b97c5557b6e7d69e1dc62d6ff5536dd6ecc072c37aeab5a94e6a06f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524d5e2511f4ac9f43d65161af302922e
SHA1b94eca2656e5554f31c2e1126d67e59badcec59a
SHA256c5f9a293b619d97dc9c40aafc6030f3128bb015dd9916a5241d80e8c32c9aeac
SHA51240876a1a0c204bb430d98b23d81e5f0b6040f6f558fb1af21cb4a15e5b79ffadfbc3caa9e4e4cc2267c7c8e2fa3b7e5f6f10ce1ed48c439bee488f6fbfa29285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa30b568d2e6ea2ab3dbd89c4b9ce97b
SHA14aca6de02d221c961fb19ae8305ccea336fecb2f
SHA256ff761caf7126daf42f2b06cff93b02f28df0026e9d1a31f9ffcee21574eefe15
SHA512c99779842edc4fc7bbaf7bf7c83ae0063e6adf163e6127eaba40a6a3ed524c86e899a0339bd49b09c39fa522b7cb80b5aa6bef052664b6e05016d4ff487d241c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b