Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
17/06/2024, 09:38
Static task
static1
Behavioral task
behavioral1
Sample
b7ee7fa28806b96304b87fd74cb7a785_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b7ee7fa28806b96304b87fd74cb7a785_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b7ee7fa28806b96304b87fd74cb7a785_JaffaCakes118.html
-
Size
349KB
-
MD5
b7ee7fa28806b96304b87fd74cb7a785
-
SHA1
4b25bcbafdf2d92b19074e332fcdf06503c890c3
-
SHA256
b653f9508d3fd41b8f152af3c522e4c4fd667159c70e8da3e7af100720058cce
-
SHA512
5fee632ca3603b0fa5e75cf25d7e649f2ac7103d0d1e10f2c344aa3455a24ad0d3836aa9f2b2a71a4c2164383a9401e6d9666fbffdf76a27a1d290676edc1d39
-
SSDEEP
6144:SdsMYod+X3oI+YNxsMYod+X3oI+YAsMYod+X3oI+YQ:05d+X3d5d+X3Y5d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a03905000000000200000000001066000000010000200000009ddd0c83edcc030cd53fac97feacc8e2b087b55f48742c49c207754040e8cc4f000000000e80000000020000200000001489ad79965be0c53eaa575476f3074210993b1de0e19272030b7d1242e6a257200000008a5a9d83cf35722a73bcabc3c0baa017a7392fb5963aebc462b9d2c44e31fb224000000094e99930864639552d65aec0ed92bd6991ba3b59ca725122f28fa566a63a1586175b3f609d784bfff957aec3384bbd09afa69df9b10311261187287c1af84c9d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a03905000000000200000000001066000000010000200000008b3fe9d3c01b0be8cbc514099c49a945629e84c81b343b80861b8fcc3f1338e1000000000e8000000002000020000000138362523d42fde636ca001e51df11f745b31dd7e12f93f2b86ea6ac23ec2127900000003ecdf45768d3d79ceeffffcfe62364cb6f939ea87bccfc59b8bf38f0e6f346c24ae354a60e00b5db8cab882b680915aa4bf75aadb66d090a9f60c666bad2a6efd55ec555777348e706ff9dec6e0d01125039456b88d017bf803adc80a65b7478f795c5a78501e7dbf7f86df26b237602cae73ee883545896cf99596f3e135251c04168dc2cdc52fb2a171569a502b5b0400000001107119e901f0d0cb19367158315b353bdeee403dddfea02c057601cb06c402b1781a4802436e0caa4ae608a8b7dd908b47a8d3b2cb70f50b6bdffb553c2e856 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424778961" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5105FAE1-2C8D-11EF-A5CD-D671A15513D2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 001b8a649ac0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 1956 2208 iexplore.exe 28 PID 2208 wrote to memory of 1956 2208 iexplore.exe 28 PID 2208 wrote to memory of 1956 2208 iexplore.exe 28 PID 2208 wrote to memory of 1956 2208 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b7ee7fa28806b96304b87fd74cb7a785_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d13359ea00acc7138c7fd41d7d71894d
SHA103e3d1374095661a030a95200cb472d7c63704ee
SHA256202a4b3f1cfdb1f5fb40aa28fec59eeb4557f4e878610d313c078b11aaa12d0d
SHA512dd2a022f87451cee9f5bdb512b42ce509a6b52e16b9cabfdd03b56356e6896e18af3259fcd8fb2318c86e90cebca60bb1877bb9ca656cbf5d286966b55bb3814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0ce57213da48a6812d7501afe4f1663
SHA1e829dcbf90e1cd8a6a0d5d7f21a5f47446ee5117
SHA2560ecf5b5d60cc2003e43ee138cded4cb6edbffafb60bf82036abeba49164a3018
SHA512c43a12c6462ba9d1200bdd306e7d97fb64bfce8c8b825ee5462465c8fab11640bff389195f5d1cf0faec33bf9b2ec04fafbd8f7f9df22ffea4a5ae37e0b65f8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5580a65c80f384a99819638c6a5435a43
SHA149117c2b06f422558e69d6581a47a5c50c43576f
SHA25638dd715f3aeb57778253a193487cf51d81ea32c5db5d67c6ef74a02b8bc5fc11
SHA5126f81959969cc4f5d80aef5f98f08063217e411529fb47dac37044579f748715a66551f296a41aae16a540e1c56f0056133dadfef388b86a400a3c3be5ad21b4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c80d395ffc51235da19ad4ddd287822c
SHA148a93147fe778a94d57c9ddf657a9e8cd8267926
SHA256d9b17d426fff3af7d50002a9309fc545172e0a9bb050ab085824b758eeb53a31
SHA5129ae569aa77141374d089b35eb4abdd4fec56d20ae960e4088af6027362bd5eace1d5f0f2ae0330f2c583c5e03d07d3b8e976f200eb94e4c59f64c1fae6c81905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd0f3f27f15674c69386a39e12953576
SHA16b3d3ddabfe911216f62a1d6d1c27880dfce3a0b
SHA25693ac7a5be4fb8b121694231d04a6dface167adf157ef0c90c814af13d38f15e2
SHA51228cba8ef7c22554ee042b63ddc63ffc4519f4ae53da4e2f9674914e5cbbce04af29b51b8bd19beb7dd78855f5d070e85ef51ec293d2766c12fa4953561d07fab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6fa1e816bbf2edb69197c4a52eab8f4
SHA1852456a5aaf6e0fbb53502360c1328ac280c0e0d
SHA25673af7d52c5715d32eb58ddf10a2679a9b73c7e7075b3bbbc8af3f245830c03ad
SHA5126c0856a361e22d867968071a01eae5cad81a4bc17d5d38f72e02a2a24225ca7f8abe103f8ad543b8d844318901442b9797c66006df9bbcc0b787199478526ea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e9161692bfb0032a6f2b35634f33c9d
SHA104bd8238cd797fbfeecca06e3105d979081f788a
SHA2569eb7507a4cead5f5199044b2cb78b5cb85042493f31ae1f220c438c95b7324b1
SHA51293c11ce17e239151737e218b28b7b95c9f6a84daee8431f2301545b3e47deaba5b105f4ef42aa7a5ae3edd3d7ccf521a84e373575a5ceae96b7f4c15607fdf13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6a0c7ff3af5ecfc4c0157eef71da5bf
SHA1a158f0c2ec97e637056a70322d2ffeff44eae3d6
SHA256f3f4cce6992298e0d22eab58b764bb6635f3b942a73279c5a8eac87b60db6e39
SHA51244aa7fb6c3977bf4b71b70d2f3ff7807f17a626803d4ea353d7a0fb9558e4880fc68fd63a511c641addc552a312ebdb1318c261d187f15c63e4a4a97189fa1be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a70cceb0d42c62c75364d026ae2436aa
SHA19ac3de15a782974e6b27a14bed2b7c32191a8e78
SHA256b241be33779e3466080d831b96c652b82c1f2d12f391aea71621fa7726b75cf3
SHA512441dfbb37438bef171e1b12a1d62fb77430bae94256ede237f9910bb8ea53bcc304c768f2db2edec8337fba5f04b61fd1555dd1d37a9dbcb83f7ae7b9a241cec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9aafab87c31a574c6aefac5e7eb2aaa
SHA1f1e5295a2d7eaca2411edbf81d39d2b728f7a4e0
SHA2561c0a5b89aa72317c5e414d05c9fef4a651e1389838ca52d63699991ee38f27c5
SHA512657366da9eb9e24cb8d458489402fbf09edd4f9739106c96564b722a4988ed0bcec0cfbb5600278d9960c58dda6726c28070766776a6dba8591039616916cb60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589e354f172df82edb7bb862a4e5d9f87
SHA1552006c21665ecfb09603e62635ce71c48028482
SHA2567b84f5d538154cc23e46d7751e8e1d982fbb97c8bf4ba392ac69428e14ac4613
SHA51264b8a355da184d362ddd0ef0ddb6087d7d127f624a97b5ac738c5d6587acee24e33b012ac31091ce3a663c907f1b4c97d8f21074597c27181a908507dce5d90f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540a4b79460afa42804d50e6199987b06
SHA1b8dd3adc7a345c83fbe209f0234a4432a9d1af03
SHA2569990ee376464ce3b12ffd99dc17866702b8d6aa9bd1f4cc3f7cde37a7e466c1d
SHA512d2ba27c09d794b2ee9b258bfa08f47534a4eaa688e1f7deb6ab4c4193765e84aa764a90f8d9e4018b2701b8041a8ab7f18f7d62d2d52c445adbcf252523fd52e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6829015805f3b44fc5b20067504d484
SHA1cff2896360fa5514eba9c81f46367fcef2c62e7f
SHA256a9a2a3d680f7d4169897c5eea6d5030ded28cdd7a6e55d202d18d1bb4f772c14
SHA5120baa9fa02b901007567f91ba3cd63d0bf1ab4d0a615a66ed2cb0860f9d8309bd9585f3346054c67854665546646191df7093fde387a3b0a9d7ef883aa14bad47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9332a901536b817caebea9aeb01f2ad
SHA1969c60e7271e29737762eca9a9ae66b17f973a80
SHA256044dd028492cfc6ad815d342e727fa95d02d2f97d1ba679f78d330ae296f0b9b
SHA512b14adefc5f401a44b6a41b4e1d0d2b66446a7ff365bc612301e9ff5b466f793eb694cb3daa048032f88ded284e866018d7bc58ddb21e410d295bfcfdfa3945b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a6ac931d8f2bdf47f1c8383563ace25
SHA1215250e2b70b54eb3067b70288820429e47b7a9a
SHA256fd9d150f9caa518dcaa5e2926027249ed567f4b75a54915e448c282f40ca303a
SHA51225998dc6f8b7cfafeb7437afea59e593485d447dbc4f9f4b70d7597632dd9363cbccc778611afe588fb3c7e65e84af535ebb9e5370478102c3bed27f0ee54816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a65e68c6032d55ab6f7cfbd598cd0b1
SHA13f6900cb27bf569953beff4f089cc1d953398343
SHA256a2ba4af17cc9f8ff2d726d952e81cd424e3e6796ca684ca4c871f61473725e8f
SHA512b1eec185dd6c3f82d58febc826f0fd41d24a927003f41bbcbb4fc4fcb5439fa0107064dd3e1de410c40cac04a14d8e6d2ea819809166d98b173e8132106527b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbd4f573ba8754c8d58942ff1943cb05
SHA1d2803f326fb7c6344e171e4d2c855d2003a2a7c1
SHA2564232d302e545b6e6391862964adae83b8a89ad4153be7b4e89f6344ae3932948
SHA512f44e8efe515a6137bfaa5e366026fc4b59c3563a05e3f8ac8ded455210a1de578ded586a0470824aa0dec1ce02e9afea24b254da2258f50eb89b22ed68c01121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7ae5b2935efe672934c1f2d78a953cd
SHA1cf0894d56882407e1cc53eb10e56f75d4d4662be
SHA256e2c8ba245096f57f029e38e8bc5fdbd423f142d8f2bc40182b57a062fa931908
SHA5129891c4fc86efb2d1f8d8079085637e3346d4988b1504935e166b48011b88d11388ad0f0345f35af84a69a906ac8156efaf91c78ba2d6e95e450d5afa9f5b499c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b5f97ed272d3e67b261f028fe07aeeb
SHA18044de2e382a91e71cb9b03215e0aef86ea3b900
SHA2569884efd86e6f760c0112c8a6f94ceff2ef450e60900b28271739ebe8eed03651
SHA5125ee30331d8399aecf0dd8d69120c410b7796f93d8d24b42bd3620775d5f8529af273c849295cfcea8790fbadbbaf242085da46634376cd92f4852d6bba5d0e09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5182f9f6cfe332bfc17697c14c7dff82c
SHA1396292a5a69940840fb02b2ac3793d1837f27236
SHA256cfee4d0760adbe9e43eaaef87a179f9aad9878e63212ed6a131d8167f55a3b96
SHA512f6aec6d3cc30800b4eec38fab74d24a143c77e1b174f60f1a9b24108380fe27c0620fe44259add9d602a427f6bf494fdb2f5ee8e2df43d0374a36cb4f4c8c325
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b