Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 03:19
Static task
static1
Behavioral task
behavioral1
Sample
4c98c3d842f12f733025f920d0e109eb_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4c98c3d842f12f733025f920d0e109eb_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4c98c3d842f12f733025f920d0e109eb_JaffaCakes118.html
-
Size
15KB
-
MD5
4c98c3d842f12f733025f920d0e109eb
-
SHA1
537c768a4b51a5db6e777d0c85cdf5290e7ee6d2
-
SHA256
e55cd20d3744539a4283e13e3121873f8955bf9f590a0cc2814da9190a0f096d
-
SHA512
a2603eefccd2afa8267681580b76fda70576a37455e29681dbd3b3be7af1c5e2e5afa2fc64e6962b959a1cfdcc3d0dc75a1a137a1926c50351b0f15cd13e6ef6
-
SSDEEP
384:F+kJy9x9iGj48aagZop0miA1Sc4M2oL1Mkf9l:bJ8/iGjyoOYxXT1MkFl
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000ceb1d7a9919851da55ab79f24ade7c6ac8ff68cbb7864b790f549e85eb2ce7c1000000000e80000000020000200000004a178568a221cc960c932a300ceef59ad84500d449bd3524ab66e12d425a61fa20000000b7ea57fd2a035cc2dafb009de1ec8301d23fe70d980eee9aa0cb693af4fc717f40000000ab5f566728e62145666d0d86429f09233826532dd8a8ed274cba547aec20a420e448e4661f09714ac3834bf86e8b86e012e852b492e31cae3c7356ef1cd6ca0a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d9befa2ed7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427261837" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36739421-4322-11EF-913A-D61F2295B977} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000485e2295e4fcc170a2cc3f894598dabcd3f3f6bf304d9d86f79b0e837d654b2c000000000e80000000020000200000003f92fcff2d285e1c700b7929fc2c76e60fa5c3d96fcbead434046642a8797123900000009f508f81d908b27bd183d7758da98b8c493b6df7d97565a3fb95b70a83aac16eec68f6933c5f56ceb9ef046dc3f187fdac96735309fb73f0eba30b0fa263619a54a151dd49c79aa3e8486c622c1dfa26e31ff08e363b67666704be6133bc0570237a4071848a0a795161a796d5f6368a2790e69ed7a772da58eaed3e7cd1cd57537e57dab791c846ec7b01b5b391c12b40000000202953da02ad648ff21d1bdf01339aa4f03757d4d320511f83bcd8a75d5d1a541e78752d242535f3ebae4936836776c86da311bb94721067b924a3a4eacab171 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2824 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2824 iexplore.exe 2824 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2704 2824 iexplore.exe 30 PID 2824 wrote to memory of 2704 2824 iexplore.exe 30 PID 2824 wrote to memory of 2704 2824 iexplore.exe 30 PID 2824 wrote to memory of 2704 2824 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4c98c3d842f12f733025f920d0e109eb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2824 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5052254cf8987db20647f1bd779f861
SHA108dd0148cc9186568725ad53fc5f497142873379
SHA256244cbda67b3eec8150ab203085a4d63e046a87875df4234d944b478c80ea85af
SHA512d6b85e7425e70db8d52ad8367ea0ae950efb3740f2f5de2ca515bb9233480c073351cf1a7e34c3ae01ba7d2799bdd48df5306656a7870cd455202a98561fd0f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bfefc57ce445f5c40c08ae973833165
SHA1b567c0a41b04fa25b82b2597cc66c4b0f08c3e8f
SHA256c9e0a3faa4a57a1892d10d50addc568a9a9b8d6ee7dc37e846e65acf9634b4d2
SHA512e38cea944ce875f6457798df158d35fd6365cf6d4ec1d6b4719069c1c27b8565bd57cb54f8cc6daa81ac6542adb68a43766996649456c5fde74d4ad9cc277497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50535c533cc448ec5584e4b6f8f9fdf0c
SHA14ab0ada62ab8e456d61cd034abe4de4b213b6c17
SHA256c634c6fbfebca9df94a19e07bcabe1114261e700f3f2c99c178e4021490bd5fa
SHA51247e6f445ac745e9bbe792ab1a187f6568374962b9ea09cd552f6c6c23a38bfe2eb349f710cba0da2baad2c58c53dc9e8e112d658b64b1c1a3ead114220e6f39f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1f1df35824678e5f63567d6a54d1f44
SHA10a41f133bf02ee92779494054a24804f29ec900b
SHA256580dc576a01acfdfa9d929f56ae0587575c51c7d2bc15e463149c4ce22b97073
SHA512ebcab6146ed4baff562949b94b5ef3bea64c633087682db4885a61ae96efd8c37f4132f953ead20ccf45797a8bc6e3da17f640c832baf27d6145700f4cf5e7ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2907c8c7e5b4fc43da2e113efe276c1
SHA1639318cb2234da7837767831987716f5dd973fea
SHA25616f616cfb9b7a7c58ac2132f5cd7c97fbff3cc4a108e8d7cb32cff601006b7ef
SHA5120b310ecd15b44e371f5ece59e7aabd290f185a91903b38d59ed5528c49f91222a905706850a6df617717122688489647dfb03e543f6db305f2a3eddab87c0871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef9fbb259f2f8e2ddab79d8c2134debd
SHA147d1c3bb354f24c3418c37d1fa1ab31de9d784d2
SHA256482dc91ae4de3f3b994be195e765b28881f01a74bda4da1245557ff951b92e14
SHA512d3d1bfffcabedc7ee73c56cb538d2746a209f701c2a97449159ce06e5d3139187517345d8e6e2b84c5ae02f7846f83dad0f28452d75e2b45cb5e60427507cd04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e1027725df8eef5f630794ff6b3ddf5
SHA14ea66b8c8cb61beca9a3cc41d7bcbd361ba57ff7
SHA256928f9264c78fc87fa8dd5725afc3ee1f417318c4e619f8e640f4f68c60691866
SHA51265510056443f3f3ed8c173c3e971256cceafa93094da8280010b8c3a6a272c34cafc2196d73bf330b12d7dfef38c7461b894e2dcdbe2a1be35dbf955e45be0ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56528103be68dc4cd71154e58265b7905
SHA18adcdd291a4835cff9ef08f5c28695168726cca8
SHA2562b74ce1f072491f3af07189a0c6d723a467daf9ecdc8eb00bdbf72431676ce23
SHA51283a8deb1352e94af21b67b54fe49b2fca1e0211ac6674a491f8bc74057f57ae5380f0ee158a40f168eaf12c1cf5ccd309b76381b6e4d6c52455d39f4eb9d92fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566ea4e2cd2e7402c7ffe54cd801bc733
SHA197891002a10587972c1f78c7774bcffd8db1df9e
SHA256ad1f6c5a732c9c40924e37b690067f6fb4eb9ce4afa23dd21812f70ec7219d4e
SHA5129ca6f892ed33c7eb724a59dd683e339f5cc834c0c737db908e79e38f634deb0e7df30f8676eacacf32b7a8c11e1159d4401571de7b2d0f171cc3b4fe21780ff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbec58ba78f04fe84eb5b63e1522b9cd
SHA14621a176a2ea5464c95ec4ddb2339a60508bd4f2
SHA256b7f6cd503d5c34330edd7d8366f4ace0e6eb5f871e7382e46e9836c88b621640
SHA51265abc6b466124db0fbe4070ae640a27c57362d99386a17c95c3c20859b0610ec3c63101bd8f47beca67c3cb5cdf7fdba9b1409571d5c5b69a36dbb5d5bdc3aab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b85d8d0464885d47ee52137c7c05fd8
SHA1e655ca236927adbb4f7db2ad36cd35b8a01af676
SHA25622fc4e52c6c2dda3725c902ac90e583aa4e18cea98ff1b5617be8def4447a397
SHA512685d93fc5d6fac30b27136650f07018519c016206d47b274da4c1dc624655d929fd804428978417a415d439749bb4967538bc1799f34925e45bd4fd7dbeacf5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a78c58d915718940f17dfff9c37e5c0
SHA1ad8f4be8dd102b3f7bade963f6aa33a8e328d637
SHA256514e1dda92f742fed96d580fce99cbd12173961a83c2d9a191eacaf95b430b89
SHA5126244c92dea82ececc32a816aa1e4d520ae3ec424b63506d292cc09951685ae32fdc86a04db4950980a209123e0c08b0bcdf019b1b85d5d3ed2289c150fd79ce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563191c89029c61ba46c595e9b0d95b66
SHA1276ed5970fd69036ca0672c552540117a6e589af
SHA2565e429a870f0c1fb3b5edfa72e6c4473db45dd4e6f9daa34dc6046775bad69f34
SHA5126182a30ba4fa71fc45d33b4ff429403b9c4819974c43b7e002a0dfae17051b0ff484fd0c5ffbbcd9357941b8b274b05337003232d044ba2f1eec5030790713d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbcd22c3e0ec83d0d4f51a09e40c2ad5
SHA18532ac7eb97c7b4f6059a154c95395c7c57f5289
SHA2567e78ede28065dd99db9df00891a931ecaf3a04333869bc555ebc3529dc70b317
SHA5123a051947167d8ac92d9b61e01a764a2bdeb8341e59e54cfb9a7c82b399129cb7b1b3eac97db01f4ca3e1c47c4cb797257f09fbdd71bc2c6464173cf9e315700d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570967295708c31124e46a6ac2dbe7f57
SHA1269f75c43c29d023f0b1ec64a5a1dc04e885455c
SHA256e4518d6ff8c1503f5e09adcd9375f5976e25f6b21703028d261f2a14cb330eb5
SHA5125c7ed79f4a07b2e31290374f31ccaaba0e6ca3f5c2efd1d841885160bd631518ccf22530c7d00c70d94063722b7d3f2f4ae34721535ff4fa058054da0135afcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5244662c45a01c335c3f89a5851967498
SHA18f8f37950b25cd0ecbd8993e0c738073b2bf0401
SHA256a0f89bd0ee3ec36f0fec4bcf12c6b1627eaf066b706deba15372f5553fd99f64
SHA5129889323212d1804f0d9a84dcfa789129e69017d8a54b3a6afa8a62d27b1b97a692702f522adddeaea18f42a5cb3bbbaaaa900c23f188ca40577d8f02104220e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52acd8b97fb34ecd1c9f8cefe0a3a998d
SHA1cc4a2a3219305ed91c7a0185095d4789f4c036cb
SHA2569bf1887bfb7249f6744a0d013627e0cffa6360aa8d9fa98f7091fa1ab16ac8e0
SHA512cf7c696a4acad005cc48cb60c8ed2a42ff0e3a7bc2cd2c483ca0233744c950ac32ce0852073a4f378b0354222d11bd078d69230074e9c14305f20b99040ce4a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57907f62df1bdf48603c73080628c0a9f
SHA1a68ac1baba9363fddf8ebb1f6256aac88ef20c9c
SHA256841319ece1e9c18b3386e9856320e4328b9569e487f7e7b4442e8bc3d85653ae
SHA512245446955ce421da7b2d4908361388860b3956a4713dbf816cc3ea089fa23e652c68e15186ba022142348c4b831238659f455c8b0efd169cce4ee156270046b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc05bca2570d53b59a46c3e6786f22da
SHA1fa69d0121f83d7f2e24274343f81a4cd0515dcf9
SHA25625e26adb78ca23b9c44b9c73d325da9983099af9a359dba6c363a2ecac739f6a
SHA5129dad1283fbb993b17cd920460c80caf6d9474dc701bb2c35456304caf275939c04ebf2e898f53fe15f371468c0139909359f1855d61629d5b6755909cd8257a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe6db164452b7e7b7fb9573d7f3083bb
SHA1387578b0fefe4c0bb082911ff4ac5916a0bf071f
SHA2560b2625fac2e2e5d94b951668d5e10f4441d3afd3bb141d5669c09b15d65140e7
SHA512ae84ef11933ac40cf7917ca6c79a1f1957fb6609d5572724b56c2d2a49fec4e898c1a8af1d2ca79073b4e97edefd87c2f698fe3eb3d463bf802f257718e4b9a2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b