Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 12:37
Static task
static1
Behavioral task
behavioral1
Sample
45d72b2b8d541de5bad1e574c9997b88_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
45d72b2b8d541de5bad1e574c9997b88_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
45d72b2b8d541de5bad1e574c9997b88_JaffaCakes118.html
-
Size
10KB
-
MD5
45d72b2b8d541de5bad1e574c9997b88
-
SHA1
cc33f6a0a51d81f24fa029529db3cf7cf310a6ca
-
SHA256
58d312b7faa06d9a63aaf0ee2444cc63c51da5895fd35c90178daf36b6c60b9d
-
SHA512
73ca209f374b1c89a24a09c0e09439b614d3a4ea780a4837f92e8e0c44b64db4a186c4357866f281bc5c9734ef43c0f3db500efa8229f70ce4ad7d00f8a0fb04
-
SSDEEP
192:OuF4g1v/jIPdif6IEJFjKarGP7dBu4coB/el/8vuu2OMnhzSOOuG:Ow4Osl8MXDGP7Du4cnl/FOuhuB
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000314a3d3888c79dd2e98b01478c71695f321722618aa974fb206c4c43ef518d98000000000e800000000200002000000024b95e8a18b4569bdcc1dfbbd60beb42841d4065a2ede2a99a85c70dae6cdcce20000000bee43dabba86ce67b5fdcf8b698b643add6ef8f27e9bb4c38d39776f5787ba93400000000680e0aaa41f9da1324a1f5f545f8191ed728ef939748a8b1f5f463c3b16fbc4e29fed3ff051751dbf6372c15a75ddf98cf420016986a1de027394dd0b8d5bbe iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000006877cae8346230092cafaca539ba09118ed570a361ef411631b9ee920eb4c0c8000000000e8000000002000020000000ec5be9a4e26dbc68f34f7e97111be32a00f4370644c694056e142dc79a789f0690000000313de001e8d9a66088a0ac74d0d810d8646ad5e38655c218b3a0acb2455805fe6a6e4f2f7e15f4727dcc8239b9da0643cba932a07099395edf629f7a800cbe3f65efa746871d90cb077cb6b5ddcb2d082bfe6bfd9c8c7301de105cdaed87105ce2f05146d7573589cef0c5f7b3e64cb39b1f38915b51bcb651ce7bcc6372beb01e04f3e9c667edcabf24b0bdb1506e234000000084fb129c6a1918f3581788c1323dbadd91a45d5480025dc53c63fa74e20f3e94c00b7ef8fc951e271b5a5f375a31b4a275e314219f2ee5d422b148639e23eb1e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C6EA81D1-41DD-11EF-83D9-4E15D54E5731} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1033529bead5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427122492" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2864 iexplore.exe 2864 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2700 2864 iexplore.exe 30 PID 2864 wrote to memory of 2700 2864 iexplore.exe 30 PID 2864 wrote to memory of 2700 2864 iexplore.exe 30 PID 2864 wrote to memory of 2700 2864 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\45d72b2b8d541de5bad1e574c9997b88_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c1867d0f416cd1de07f1f6d3b5ca080
SHA17998c5c9c1fd096fb719276cf16db11ec3dcdd14
SHA256c625beef9457e4776b5a680e40e50c025aabc2d16ca71f40637e40a17cd16567
SHA51262f0deafa40f13392b4fc86303900598183d00898171f5c8c0465788548f4e94e73324d9570154ae58e6027ee43c8e61d31bd3eebf67a028f454a3220fcce4ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f71b7086ac5f8efa2df1f92f8b6128ad
SHA1a9af45a619a3090447c01848532c54bbaeb01f86
SHA25665894e5e424ee6a5645d5bbaaf834b0e3b045dd43ec59548b1e8f42b375e9e9d
SHA512b08037a1959b10b2135ec7dddf290b60d5c276ef27b35d872071c6583818097b80b0f7456a65f86c950f49932888576dd0cbb0a0329f6200ed3f8b62739e6d19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a8db6e351e59c7ac05599824d7b6415
SHA138d565992cb0bdfa74d323cd7ed0da4c1d4da8a1
SHA2566e8c4a260a78602ecc3c223821386bf18b68cf4e96ae20590ca8d9acab297e91
SHA512d955d5d7d8378ffbc5efac954ddfa6a6699e768aeb49cd20ccf29c782ad9ff1fbd81ae547f11b26f3706f95296f2e32cb5c3cdd655dfbc5a379f45d1d4141c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59819d8623cc7da313e2cbd60ec614795
SHA14bbdf9d5d87865cf01a33f55bab56923d95f0551
SHA256495500397b4d67083424d140010bbab56766b6c184c3bb0819ec9239eb7b2665
SHA51252e23902abdaecab51be1f11d3822b21c9a21d8cb73226bee2b3fa00afc3861b3bd03ff0254f328dddcb4dd86fa8171568b53d4204c3d44ede429e77b05c0e75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58193094c374d2ce5b7eb4eac271de10e
SHA188a0b3fcc99c4d7e9b12600bd1487213cf8b49e0
SHA25607a5fef50499df6cf00b35ed5f21e6fef110b274705f25e548eafb3380969f92
SHA512546d6e31ba89f039a93c98a9c05a89af0fdd02822dd5702c48d539ea01fb7ae97dfd21bdb2f7630cd63b9b36a304e86f4907f8c4139f0188b66da2b27fb85b35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522a0275b52db8af134b74273403544e7
SHA1cdf7781d568b1108dcce9b4e147636c95835c552
SHA2560a68dc532b76b68098a8fe2df7ea67124bdf38ea61e3ef8e36d095641e50ef07
SHA512c94b0feeac33a1096ff3e3a79c96aec474ecfe587777883546fd7e2b7df7ba48dc1a80532139f2e47a4c100b1c6cb9d9fc2ea76e12ecb1e458b0ae85e74d4797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5647d9fd00608dec3fb0c28baf4a7f463
SHA1d92c8611543ebb905a018b62cb36809478389bcf
SHA256a79172b4304cc026a9b4e45997877ffed5c7ff50fd260086ae955b2eeea5221e
SHA512ff2c4a9b670e7c5ded1844c7260d049c8036a9f0d5c13e1d258f1b578434b8c7859479ff85c4088bcf75567b7f7072f582ea41a24cd4dd3869140b26c6022a38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec05b15f993865490db98777e1b3d064
SHA1240ef6359f3c0a2c2ec680cec17b991970bcc428
SHA2563347a419e3aff77b52cecf53161376ee2a39a2073557bb0643fce7538d8d5e6f
SHA5127f17661ded6574eed82d294efd352800cc405eddd54515a86eca443233828911cb661e24f38ab30b89116f216242296c476fc711f11fd18e74efc4c96962ad88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50582e9b38db3a78fe11135d69a2858fc
SHA197cbc3b6625bada238ce0fcaae1eadfb0a999fbc
SHA25625c70999975475aa9f2b3bed1ed3bd43b25e3689a843d96ed69f39ab46139cad
SHA5128d7c26a5da224031697f1d79777d10e9a2f1d1fb2acecbe093e5f10749f5caf7e423c583d47f017b66c4c50881382cd2c585283b6fb2bb595336700d3b31ceee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5881ea3e8af2f7ab15cec8883e5b5f82f
SHA1e56b9d5a0b6de8a23b498febe4d548559e3bc82e
SHA256698624a19c4a14de5903ee3fbb9d9de7dcb5600bcd838df9f7e50fdf5b1b7152
SHA512a047b0e4354f45c4d788c4312249b4473bbbc614e0caa76b92cb86bb0138a608198c1a0a47a486a64c33f2817b82b89a59369830b0d27aa99aa300bc1cba9100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c48c511342e5034e74d9ee037f13a8c
SHA1a0692cfb9f3fa2b5771769d7c1fdbda8a846fa1d
SHA256ece5a722da29a4e89331149a7da6178efc8c17614dc66bb0ef20e18b2d39e2ff
SHA5126177a8c90d5b69d6491c8955fab087ce1765854422867c225b9d41fabe7518373577aefab48bd3671e159b3f3e0e874008ce866f24013533225050c2da57c465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e03e61e8863bd7207f2e946f7446ce70
SHA1057dd4b6f49f5ceef7f5650933664dbd02268580
SHA256a7eedb21c96c66d0613fefdbd97000afc1eb513ee001e9954a1b1d1210494be8
SHA512bfd1deb3e4f50afa7b34f828a9fc2698ae9521227dffeb7b726dd91d9c05e420b449a6eb75e37e9454e5cc4364956af7a85fb2872a88a526e04aa30b92eabfbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3025a5a5afd57a948dad962683ab1b1
SHA15d0166ca814146fd907f143572018a982bda07e9
SHA2567847c93ff659a5b72aee12edf348b535db91b9838579c4bb42c0edf059cf09c9
SHA512e5290e0538a2ad1710b6aa6831a2ad9384cd195d112156ca3fd3cf52c38774b8cacf3d600f38b9d1c8fe6ece2f4e479776aeaa03116f36327f371a0b52394013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1155423406318846bb5f7ab1c688300
SHA14975ce324288073b10522725d5936c30b87867d5
SHA2560291a2f07f6b3988007f0cfdd61762ee6f9535a5699dade504d9f1cb992f887d
SHA51268282381ddc4b4a5976992ee2c3f439be327ab952b92b9ba42ff6e4dab62b99a73b35c813862cb84b7572852a8a4209b86b93e8ea1cee1e5d6802fb3d2e56a59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8bd0d167ebf08b9189a709624074320
SHA16c29515db7322d856dd3cbe0654d9b7c344c352f
SHA2567140f9d8732b8f8734b8fb91276fa83c67e476be3e9ec19737210370179d3f78
SHA51210437c414c5b527703b8339e890ff466147b08d84e843db5ae9b6d0cef6a64c866e7547391664c46eaa916969aa726a9665465b3a0c248c87a58bcb3cfcd8f7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56573b1cac15e06fcfe45a45239795b59
SHA14e3cc7813b33d8450d5095af76394f58608f21ef
SHA256f26b2ad2d18a82b96e9a006f501f33858c46010b71d81c07020699d221824aa0
SHA512bd02cc85576d03392929abe7d624df45f74a0b1a06819c09823da281d47c4c64380deb42c0953e2d2dd995b0679587f756878f351de2cee07be5ebbb92439b36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a414c427f38a3c7f8196b9508f4b13a
SHA1685e603145c9240befbff9747dcb10eaff7afe4f
SHA256c041aae54dbefbb5b6b25f0dd22924e5831634190a0fa154ee470b81ad537975
SHA5122e2f3c968a15e2b675d0ba540a675645ce53f23de877592aa38c2b71ad788f0a4aaf25fe362a9f6fc80cd85b1520d8997e17011c705b906fa48a78406023251c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d86e3c731dce8d18e3de64f9e86923a9
SHA143301a81b10a8b7fcc99e89c650ece98d17edba6
SHA2564e3e21f0caa8efc8bf648bf2b14a59f76fbb6304ccb7537ccaf1cf3d378ddfa2
SHA512982a28754eceacf0f325efa5779447a792b8a44fe1516c4d40e7d097fa5fc845abdc85f6fc9e6149ce989aa689f02743834ea4fc4ed0f6bd30ad89861ee4812c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9e993942dd90228eb28f3e8549f5c1c
SHA101cd2a9ee140ae09da551c3017d1cff5dc763733
SHA256e007d0c3b0a4acb53edef24a13cea97dc98724dccbd40fb4f5d2da983794e06f
SHA512a15a2b2ca79ab40022a457ce162d5ddd5544df578c692d0725046f7f5903cc2a462b76fec2fba48ffc05e1f67975a798700015486ff8dcc571dd14868349316e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585ffe14803babe529b3ccb1f80446124
SHA1585e03fcc3fd43b1c105bece438dba93cbd8f908
SHA2563ad032b1ea742223c058e8a8d97e3c594b9cecb0f8294685f0bb06c229073b27
SHA512833bd6bf6332a6e44c45d3f128a932e11c24c67fe151c6481793b514e463e764fd8fa842c58ef99a009b4e3f7e74a917d08fb0f441341478ffe7a36560026492
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b