Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
126s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 12:52
Static task
static1
Behavioral task
behavioral1
Sample
609c6a05bc047bfd08fd45e148f18990_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
609c6a05bc047bfd08fd45e148f18990_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
609c6a05bc047bfd08fd45e148f18990_JaffaCakes118.html
-
Size
27KB
-
MD5
609c6a05bc047bfd08fd45e148f18990
-
SHA1
b23ba4bce64cdde5845c7b0c8edd589db7314c21
-
SHA256
31a7fd2f2df52af3070c0b5ffb4d77ee10b6ed27fefd33c8f534835f0c91cfdd
-
SHA512
804c90fde8b745221b99010f8a449b46d841ea6037788be4d50b03977c114f4066397cfc8fe9240d0adcb55871b690a4a1925b4ab91f5904d9d3dc6632095617
-
SSDEEP
384:BsHYFnneu5pHJLrN6auOQuIfIX183DzrWRKTX:BqYRneUTLEauOQffcK3DzLX
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 109291e36cdbda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000008424bf02c7735efe0c7d14e98e08cddf3ea1b8a20cae255f66da035d6ea48e01000000000e8000000002000020000000ad4b94fa71558ac74d7cfee664bb4f479da794a018ab847359fd65367ac1d2cf90000000459e1923e07678ae834ff8c9bbaadca6ea6c9e79a58f75b2ac6584eb380e77f4433aa8c085f1afcf98965db90a23e10ac746806ddcd301bc48272eac3d1fde37df00455a37d2a3ce57d85e71d870556b9db8da12ddd2bdbf19b1804750392ab0854f4dc0dbc78b83b935a52feca0f7e8d6305e9a8a682fcc9f3fccffb6d68e455df17d95915fefaf3339c3c4f29ef0bf4000000062798c6bcfe3e8e556fb59dc08b8c0024a776188e0425cd9cfff4974cd50f9d98d9342ab4f56e02ed005ac604aac00212a115503d7fa619939e2f805bd721a12 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0BEA3691-4760-11EF-AB0C-4605CC5911A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427728199" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c70000000002000000000010660000000100002000000052db9bb30c2a26904b20ab4152ea619b3342ace2a130635bae683451320a4244000000000e80000000020000200000007a67139503ba9b4b3f4c8363d4bd37f06672dbcef7690a44d483084682b2f6e82000000035278e7d2d471d682902498c4b2b7e1d417c84855734eff2c71920e4b8d409f940000000e792fe863149e5fda96e7824391c1cb57e7c26852998d6917e1909bcef7ccbea730336a90ad31cbb8e82d27ddfd68560156459147c0444688eeaae1866d6d436 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2544 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2544 iexplore.exe 2544 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2508 2544 iexplore.exe 30 PID 2544 wrote to memory of 2508 2544 iexplore.exe 30 PID 2544 wrote to memory of 2508 2544 iexplore.exe 30 PID 2544 wrote to memory of 2508 2544 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\609c6a05bc047bfd08fd45e148f18990_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2544 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b83670c95213031f7982b3dca9b189df
SHA1505a94a5cd4362cf3215e05612f6ce2c229db8ab
SHA256aa8598a30b8747246a3f921b965a33580443bd449115c3de732d690f15c3a741
SHA512abd8f8072ec85f1c678dda6961583347064475a21a10dcabc02e740212738df557ffc38212714a1c72e0c733307bcc95ef0e1290daab19b7f0aed234968f4e0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56efb9414afa02d64104c35f0ba06d215
SHA161475586f694601a6c505528e94e062d1466531b
SHA256f1310ba61ba2dce49419d90c817e8495178253e7d949f16d4125c0c93b49e261
SHA512add9a96613e9214e6e2b796bc471e2b766cca34d3ff116f54edc70c23de8deb62fc455488ccd1e510aad5f761913e9e5914ae3c9dea17cda86a58cf2115583d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b3f7b628a14ebff949a030f1d8d40c1
SHA19cb90c201581dcd87595436d77ef34332d0a7f7f
SHA2568cb2116c037c076d5117cd6a553e5811ad6dd8d4e21e3e5a09fe214b11aa799f
SHA51205e6b1f0fbf8e4f745b4524a466fd5e9ced4ee778a2fc48bdd2daf12665bc099b291da72e970f63c8da50f27036f9cb648d2ead3c1db171b15656f7fdcb14ef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ad387cdc176bb997899a81aebbdd85d
SHA17c36059eb61982c3c46fd144d982c16ecf637f58
SHA256c1fd9a4449e8231e80ef5f6eac45d5edac35f515ef9c3d40fe658f460418e665
SHA51228131f539b49f3aa90ce678bbfba16e0e149b4fbfb78d638fe31530ecdafcda6f3335c1266c17d4ec65601128017b1154541f56b39d4623a985b87bd731a86f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552f3b0fae27b586d27e30921be09bb6c
SHA1dce6cf14628935b3e6835284402f0b8a3f4309bb
SHA2564ee53e476033a6733b477e282173a7ee4bfca8d91f1f9b2dd48918578edfde91
SHA5124c89e484d85a6a4718f0164c7f4bd505f4b6e4c45b49afb4e097a7baae420b4a8cdb6980e922681b1193a4e89dbeeca56ec9cd8c1ace66130a9b1da769462c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b324a8fee8fe3cf24e5cf7c18cb554e1
SHA115b0a70c8ab17bcb01f7f1ebd492d6811d5dfc9b
SHA2561360b1abce3fe25cc7e44ab1c4a2fab124e2001de97d06d4d75cc65ed89a7a22
SHA51271b0699c4c5377241d0a3c337dea2cc9ace757b16114ac4d1fff4636c20f09f11e1a24b99a04c2b7fed2514ce4b33b1499c645ef4741e596cac1bb3708f19bc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f74656e9ec1fed070f3b48fb54d76db
SHA16fa70939f5617f65f5430d2c55d6a3ea9b08aca6
SHA256672dd44771c7585156f6b4f7d072823e97e773fa65b1689547dc4f2850e6c181
SHA512740d478ad2fc9b96b42f5f49d616b0116e1ad5672c44121b69f81b4f89d3a3dcd0f06febcfb728099db977003df0944d4975c6bdd08f69dec4904e9abc19e573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515484eb22ac006eb5df230dc0b6be8af
SHA18b07c3d209f7ef6fcf0941a3481a537aa0a0b172
SHA2568f0f4afb9c4bfd276916381bfa756598fed441313f98495e3430f79f461291ee
SHA5120139fa884ccc70a90ea3c7dd6a09fa4620c38f3844e731889531495aed8d6dc01bd4d4896b5142a6e4d302012f75dfe12590de919474d45e9184460cf3292df3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee2f456859ae9c048f741ef449ab532c
SHA184eed324768a20bb6afd17f7d1770d5c9687b65a
SHA256e1589ae516321bb4b370711f019d677f5954b33ba3baff14b8fb6f3081a4a6f9
SHA5126ed4e2c2a7fb05904d6d418ecb3e3a1b75969e47dc32c9af65d40febcc211454d5ecebb5db01d68171b8799da0839eeaaba6c2dd298f6fcda8702295278ffbe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56feb704c3c5c917415982b35324f79a6
SHA1544d6e606f4454fa7b7b2b889821bd37d62de94b
SHA2562de27e06f9cc864ecb7e5e9a3cf6f467b521c45cadf7f7f30ad4fca9fb247c16
SHA512a7aca8e01617182fce18d8806548c33c26eae70acda604f6dbca47aaba297d9ef48f980bbdcf21b833c8efa38f256e4149eb0537c4bd2cdd8643f80f61185da0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c25b9b20385d28aacdfe52661a10f56f
SHA1fada82248fe0fc51da7ca4a3e607560bf40331a3
SHA256f5768a8744f99e6fb52b70d1c73a21f088d2b181b425fc7ea20e3e30cbad5fa5
SHA512f7337984eab4b4604845ec42bd88d6d4f67eeef4ce9ef5be25a4d75fa162b7178b7f437324f7454822b7dd1e5cfa5a769e76e0d8e65979c46731db579a8fd5e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb26cf10ddf571c6eed9e17b1438f498
SHA1525f6709220479af95de10295b7940e5b33cf751
SHA25645345a38cbd13704697ed5bd00c492beda697594bbde71d37e102151f6411db7
SHA512ccdad1c611a6037f76afa319df3eaecdb610820888bac01e9b20dcf9d5435b4ef35654cce213424a2999b234116ef0a6274ccb53841d3c8140b89eafa318d750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0be58d6da48d458f2e6a4e35d4d53ba
SHA157e8ef80e7d41176ea71213cde722e582cfc3c1a
SHA256fc029bca140f386160de805d7ac517046700c317bdd65329e193c6b554f581b6
SHA51250d5e0c92abf5131b06d485a5586fd6bd69cf9f8f6f58dc92c4a50258227ce7a9a78a459a24c58abdb23e1219c251076774b86490945ee3d5db7530ecf474875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59204a34df6d12bd421cdf5fff2dbd8b3
SHA11f414912a536eecce65a5a073fe630289b7b362a
SHA256f39afaf235d715fb9ddb3d03cd3abeafcecd32ad1d870a400e1dcf2fa0551798
SHA512bdccc86c3da49850377753c5aaeef569038d3bfadb89ddcfc61e0c33d49670e840711efc71286dbe046ef6014574b00bd5628a3d131f6692b4fd26af951076bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58856f6023ba50698cc8705d62193b91f
SHA17ec57f9dc2c2cb034440a7d19dda67dba29f643a
SHA256817301ed828a1101981f32cfaa68bcd55ddb7c9d39a7fb58d2a73fc93432f09b
SHA51235dbf5767a7376f11f1f18be24129804444961b5749a779d5100ebb271d9887dbc41e11ac5b9a41da173e0247ec39336968a38ad1cb76c91654c5de1f6322500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc6ac0ef8496b7c566b86b0728550104
SHA18e70691889117875ab1ddde8be2e344410f51114
SHA256d2e553ad169ef648e6bfc13e122c3048c698a583c8730c8b6b4eb232f3af21db
SHA5124fb48bd7218c1a75e892746996258ce32d772eb4080504da4eae4e7b0695a8ca22884e589146c22adb270ac917d444c48d3e17b96abf2293f33ed70d08f5daa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5661c2fe965c0441d94b74c94650292a4
SHA111534212cbec68d8586ee3bcbaf8d468a0c16e51
SHA256a33a3885d5c613175aab7dcc3a9403eacc3047515539ed39c83a104d2fb6b73d
SHA5128d2b927b330e31abb0342b14be980852ef8f9e1ff68f8194e4d7b1a0c9e0137d816c009dbd1be14b7ac9dd7823b91c8db8c2dcd8b96ae0500f0d132780b911ae
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GA43GQEJ\cb=gapi[1].js
Filesize67KB
MD5b4b711f3e747704ffe02b49791ce8cac
SHA1ac7ce4cbd3c8ee66e3c8d9d209c1352c160c3b89
SHA256f65bf40e2f0ce993b54772f703f72d53f0fa925457346fa8ec2031879ffa91d1
SHA512b738deba57337a9147927f7dd35eab7c999dea6d2ff11f57fdc2e5b6f64326028a54778886548ba128a3f03ee333cc9e43de5162d8b578b85c290626577042db
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VCY0HBA7\rpc_shindig_random[1].js
Filesize14KB
MD5f03c96248811fb7bba5b92a7929fecaa
SHA17938e96aac5714d34a1ba76972f79d52b5f403aa
SHA256dc138da7a3e8f2591ad7e46811e2681412705798dbc3baf5b08b953b6be7afe6
SHA512568fcfd183f1d8c92c28257b9b0ab1e9ae35c445aebfd56de7dc4c45db129972f3ab4bdc6d58701e421bcb8a14e69a5fe77449c853cf49a612ba917fd0bd9fcb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WNZH54VQ\544727282-postmessagerelay[1].js
Filesize11KB
MD516f1b19cd042265a234dc208fd7efc64
SHA102f67c09980ab6057f073d29f4c3f2792257d3a3
SHA256509be2bf36ff013c9a1c31ac54b751aac2401f14496662a16ea8af6903d21b27
SHA512652ce3d209d5d4c1e39f06e41e87a14a3174419b8c9cff8e5683846afb51f9f4939c41fb51a7aee67d9d26db80b370890182ab7df089f826479d3e5e2843566e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b