Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/12/2024, 07:57
Behavioral task
behavioral1
Sample
fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe
-
Size
93KB
-
MD5
fab6ba05e1cf011d57c17b703a69516c
-
SHA1
83116c49054c62f7ee9914695363c24880d12957
-
SHA256
0e36605a2523aeb76ee84d72a7eb5338b377dd6c5db997a3b627f4fa02263b6c
-
SHA512
837111b7f6345704ac80da07686be64548e687af4ca88baddaf7dd3d0241b164d0dc9cce643f709ff09569cdeb398e131cf541e6509d7c96b40cd61ab83ce2b8
-
SSDEEP
1536:AOY+p8XkkzzL14o5KnM6q/h3V7e8A+Nn0VJEojEKZM2l2nnJYEHaN1plCW5da9dJ:AfY8v4o0M6qTC8AWQDEKZynnd6NMga9X
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools mshost.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2416 netsh.exe 2608 netsh.exe -
Deletes itself 1 IoCs
pid Process 2856 mshost.exe -
Executes dropped EXE 2 IoCs
pid Process 2680 mshost.exe 2856 mshost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mshost = "C:\\Windows\\mshost.exe" fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2364 set thread context of 2336 2364 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 31 PID 2680 set thread context of 2856 2680 mshost.exe 36 -
resource yara_rule behavioral1/memory/2364-0-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2364-7-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/files/0x00060000000186f2-24.dat upx behavioral1/memory/2680-27-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2680-36-0x0000000000400000-0x0000000000425000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\tesla\files\Kaspersky Crck.exe mshost.exe File created C:\Program Files (x86)\winmx\shared\ICQ Account Cracker.exe mshost.exe File created C:\Program Files (x86)\kazaa\my shared folder\Microsoft Visual Basic 6 KeyGen.exe mshost.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\RuneScape Cracker.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\ICQ Account Cracker.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\Windows Vista Keygen mshost.exe File created C:\Program Files (x86)\grokster\my grokster\DivX Pro KeyGen.exe mshost.exe File created C:\Program Files (x86)\bearshare\shared\AOL Hacker 2008.exe mshost.exe File created C:\Program Files (x86)\winmx\shared\Windows XP Keygen mshost.exe File created C:\Program Files (x86)\icq\shared folder\ICQ Account Cracker.exe mshost.exe File created C:\Program Files (x86)\bearshare\shared\Microsoft Visual C++ 6 KeyGen.exe mshost.exe File created C:\Program Files (x86)\limewire\shared\AOL Hacker 2008.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\WOW Account Cracker.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\Limewire Pro Downloader.exe mshost.exe File created C:\Program Files (x86)\icq\shared folder\Kaspersky 2009 Full Suite Crack.exe mshost.exe File created C:\Program Files (x86)\grokster\my grokster\Windows XP Keygen mshost.exe File created C:\Program Files (x86)\bearshare\shared\Counter-Strike KeyGen.exe mshost.exe File created C:\Program Files (x86)\emule\incoming\PhotoShop Keygen.exe mshost.exe File created C:\Program Files (x86)\icq\shared folder\Norton Anti-Virus 2008 Enterprise Crack.exe mshost.exe File created C:\Program Files (x86)\bearshare\shared\Half-Life 2 WORKS-ON-STEAM.exe mshost.exe File created C:\Program Files (x86)\emule\incoming\AOL Hacker 2009.exe mshost.exe File created C:\Program Files (x86)\grokster\my grokster\Adobe Keygen.exe mshost.exe File created C:\Program Files (x86)\edonkey2000\incoming\RuneScape Cracker.exe mshost.exe File created C:\Program Files (x86)\limewire\shared\Hotmail Cracker.exe mshost.exe File created C:\Program Files (x86)\winmx\shared\Kaspersky 2009 Full Suite Crack.exe mshost.exe File created C:\Program Files (x86)\grokster\my grokster\Microsoft Visual Basic 6 KeyGen.exe mshost.exe File created C:\Program Files (x86)\edonkey2000\incoming\DivX Pro KeyGen.exe mshost.exe File created C:\Program Files (x86)\edonkey2000\incoming\MSN Hacker 2008.exe mshost.exe File created C:\Program Files (x86)\limewire\shared\Counter-Strike KeyGen.exe mshost.exe File created C:\Program Files (x86)\winmx\shared\Counter-Strike Source KeyGen.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\Adobe Photoshop CS4 KeyGen.exe mshost.exe File created C:\Program Files (x86)\icq\shared folder\Adobe Photoshop CS3 Keygen.exe mshost.exe File created C:\Program Files (x86)\emule\incoming\MSN Hacker 2009.exe mshost.exe File created C:\Program Files (x86)\winmx\shared\YIM HAcker 2009.exe mshost.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\Windows 2008 Server KeyGen.exe mshost.exe File created C:\Program Files (x86)\icq\shared folder\Windows 2008 Server KeyGen.exe mshost.exe File created C:\Program Files (x86)\icq\shared folder\Password Cracker.exe mshost.exe File created C:\Program Files (x86)\edonkey2000\incoming\ICQ Account Cracker.exe mshost.exe File created C:\Program Files (x86)\winmx\shared\AOL Instant Messenger (AIM) Cracker.exe mshost.exe File created C:\Program Files (x86)\tesla\files\MSN Live Password Cracker.exe mshost.exe File created C:\Program Files (x86)\tesla\files\Adobe Photoshop Keygen.exe mshost.exe File created C:\Program Files (x86)\icq\shared folder\Adobe Photoshop Crack.exe mshost.exe File created C:\Program Files (x86)\grokster\my grokster\Windows 2008 Server KeyGen.exe mshost.exe File created C:\Program Files (x86)\grokster\my grokster\WOW Account Cracker.exe mshost.exe File created C:\Program Files (x86)\grokster\my grokster\RuneScape 2008 - Newest Exploits.exe mshost.exe File created C:\Program Files (x86)\edonkey2000\incoming\RuneScape Gold Exploit.exe mshost.exe File created C:\Program Files (x86)\limewire\shared\Half-Life 2 WORKS-ON-STEAM.exe mshost.exe File created C:\Program Files (x86)\limewire\shared\Limewire Speed Patch mshost.exe File created C:\Program Files (x86)\tesla\files\RuneScape Gold Exploit.exe mshost.exe File created C:\Program Files (x86)\kazaa\my shared folder\DeadSpace KeyGen.exe mshost.exe File created C:\Program Files (x86)\kazaa\my shared folder\AOL Instant Messenger (AIM) Cracker.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\AOL Password Cracker.exe mshost.exe File created C:\Program Files (x86)\edonkey2000\incoming\Hotmail Hacker.exe mshost.exe File created C:\Program Files (x86)\emule\incoming\Kaspersky Crck.exe mshost.exe File created C:\Program Files (x86)\morpheus\my shared folder\Myspace Cracker.exe mshost.exe File created C:\Program Files (x86)\kazaa\my shared folder\RuneScape Cracker.exe mshost.exe File created C:\Program Files (x86)\grokster\my grokster\Adobe Photoshop CS3 Keygen.exe mshost.exe File created C:\Program Files (x86)\tesla\files\DeadSpace KeyGen.exe mshost.exe File created C:\Program Files (x86)\winmx\shared\Limewire Pro Downloader.exe mshost.exe File created C:\Program Files (x86)\winmx\shared\MSN Hacker 2009.exe mshost.exe File created C:\Program Files (x86)\winmx\shared\DeadSpace KeyGen.exe mshost.exe File created C:\Program Files (x86)\kazaa\my shared folder\Microsoft Visual Basic 2008 KeyGen.exe mshost.exe File created C:\Program Files (x86)\grokster\my grokster\MSN Hacker 2009.exe mshost.exe File created C:\Program Files (x86)\emule\incoming\Microsoft Visual C++ 2008 KeyGen.exe mshost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\mshost.exe fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe File opened for modification C:\Windows\mshost.exe fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2336 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 2336 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe 2856 mshost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2364 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 2680 mshost.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2336 2364 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 31 PID 2364 wrote to memory of 2336 2364 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 31 PID 2364 wrote to memory of 2336 2364 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 31 PID 2364 wrote to memory of 2336 2364 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 31 PID 2364 wrote to memory of 2336 2364 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 31 PID 2364 wrote to memory of 2336 2364 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 31 PID 2364 wrote to memory of 2336 2364 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 31 PID 2364 wrote to memory of 2336 2364 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 31 PID 2364 wrote to memory of 2336 2364 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 31 PID 2336 wrote to memory of 2464 2336 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 32 PID 2336 wrote to memory of 2464 2336 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 32 PID 2336 wrote to memory of 2464 2336 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 32 PID 2336 wrote to memory of 2464 2336 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 32 PID 2336 wrote to memory of 2416 2336 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 34 PID 2336 wrote to memory of 2416 2336 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 34 PID 2336 wrote to memory of 2416 2336 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 34 PID 2336 wrote to memory of 2416 2336 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 34 PID 2336 wrote to memory of 2680 2336 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 35 PID 2336 wrote to memory of 2680 2336 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 35 PID 2336 wrote to memory of 2680 2336 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 35 PID 2336 wrote to memory of 2680 2336 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 35 PID 2680 wrote to memory of 2856 2680 mshost.exe 36 PID 2680 wrote to memory of 2856 2680 mshost.exe 36 PID 2680 wrote to memory of 2856 2680 mshost.exe 36 PID 2680 wrote to memory of 2856 2680 mshost.exe 36 PID 2680 wrote to memory of 2856 2680 mshost.exe 36 PID 2680 wrote to memory of 2856 2680 mshost.exe 36 PID 2680 wrote to memory of 2856 2680 mshost.exe 36 PID 2680 wrote to memory of 2856 2680 mshost.exe 36 PID 2680 wrote to memory of 2856 2680 mshost.exe 36 PID 2464 wrote to memory of 2884 2464 cmd.exe 37 PID 2464 wrote to memory of 2884 2464 cmd.exe 37 PID 2464 wrote to memory of 2884 2464 cmd.exe 37 PID 2464 wrote to memory of 2884 2464 cmd.exe 37 PID 2884 wrote to memory of 2292 2884 net.exe 38 PID 2884 wrote to memory of 2292 2884 net.exe 38 PID 2884 wrote to memory of 2292 2884 net.exe 38 PID 2884 wrote to memory of 2292 2884 net.exe 38 PID 2856 wrote to memory of 2864 2856 mshost.exe 39 PID 2856 wrote to memory of 2864 2856 mshost.exe 39 PID 2856 wrote to memory of 2864 2856 mshost.exe 39 PID 2856 wrote to memory of 2864 2856 mshost.exe 39 PID 2856 wrote to memory of 2608 2856 mshost.exe 40 PID 2856 wrote to memory of 2608 2856 mshost.exe 40 PID 2856 wrote to memory of 2608 2856 mshost.exe 40 PID 2856 wrote to memory of 2608 2856 mshost.exe 40 PID 2864 wrote to memory of 1708 2864 cmd.exe 42 PID 2864 wrote to memory of 1708 2864 cmd.exe 42 PID 2864 wrote to memory of 1708 2864 cmd.exe 42 PID 2864 wrote to memory of 1708 2864 cmd.exe 42 PID 1708 wrote to memory of 2744 1708 net.exe 43 PID 1708 wrote to memory of 2744 1708 net.exe 43 PID 1708 wrote to memory of 2744 1708 net.exe 43 PID 1708 wrote to memory of 2744 1708 net.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe2⤵
- Looks for VMWare Tools registry key
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\x.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"5⤵
- System Location Discovery: System Language Discovery
PID:2292
-
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram mshost.exe 1 ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2416
-
-
C:\Windows\mshost.exe"C:\Windows\mshost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\mshost.exeC:\Windows\mshost.exe4⤵
- Looks for VMWare Tools registry key
- Deletes itself
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\x.bat" "5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"7⤵
- System Location Discovery: System Language Discovery
PID:2744
-
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram mshost.exe 1 ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2608
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5fab6ba05e1cf011d57c17b703a69516c
SHA183116c49054c62f7ee9914695363c24880d12957
SHA2560e36605a2523aeb76ee84d72a7eb5338b377dd6c5db997a3b627f4fa02263b6c
SHA512837111b7f6345704ac80da07686be64548e687af4ca88baddaf7dd3d0241b164d0dc9cce643f709ff09569cdeb398e131cf541e6509d7c96b40cd61ab83ce2b8
-
Filesize
53B
MD5e6ed7be2b9572503f07663ca6e53759f
SHA17ad80bd38f2a27e06c111b551c76ad0a0585c194
SHA256b1a6c027d18eb5766129a059f68201e6fb8c68d095f3932983009fe5ae2e4df9
SHA512e0010782b4fe567290536743375112db3107f8390d4c5cbb97f1bf1a8c83825399e1fe2fe9793d351896bb704f3bdec583fa7241b853b136fa9440a927d94227