Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 23:49
Static task
static1
Behavioral task
behavioral1
Sample
8554d75b0eaaae328f08c98deafdc1c2_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8554d75b0eaaae328f08c98deafdc1c2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8554d75b0eaaae328f08c98deafdc1c2_JaffaCakes118.html
-
Size
13KB
-
MD5
8554d75b0eaaae328f08c98deafdc1c2
-
SHA1
001cd416b6da1dccfb827203566883d1523d373d
-
SHA256
1dfcceb311cdf3ccd9aa922e0c0815f1d3aa42a90c547ba56aab86a9d21cc7a4
-
SHA512
45438bde5a5679ea98c62b6cf49f4770fc1594eec7523b803132676f1c42bb94bfee0bef0409a9545a1e041d9a0da61cef051a0d24797306cf287a0f645ee694
-
SSDEEP
384:6QRpdAkdInUTu1ABf2fr3fYf1Hr3970/e1I77TvbYPK5OhjB76ROE0b:HR12UTu1Ap4zCdb97021I7HwK5+b
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3AB41F31-1EDF-11EF-B33C-C2439ED6A8FF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20460730ecb2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423274828" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004618d36e132b7743aa3d48227f556403000000000200000000001066000000010000200000005ef80bb37933a246cee073caba79779f7b3a6997374a9f51c704c472d7695a0b000000000e8000000002000020000000f506e8a60b59a31a7ecd8e0706c99975e21a739f997f73d5cf6d5eb4bc8ad71620000000a68f90de98863de3d5ca9543d718996c669020948f7ddc381dec5b51be735e8e40000000af522bb3c64587db4024ebf88dffcc3275a94c6ef3671edff6109fcf78c04a3362574233d3be97b8e3824f3fceb6d204a21c592be022c729f3c72d03bdeafb84 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004618d36e132b7743aa3d48227f55640300000000020000000000106600000001000020000000fde36d72da4f4b424cc463dd7322a554a66b5bf1c585cddc4e49c176cb0d0327000000000e80000000020000200000005eec6270d0c88c298e4f4d6b51aaa2e0181d8c0622329931b50f4a0190ef522a90000000e349075e23c09b1d7442608137993011f35f76a0ac694f7da6c3240d27b3b00b60681ca635b5636cd1a99f50b760262e8dd8e72d3281d0f590b275e3e8a01e04d80cbb6b69f9b51795f5b236cabb26acb08dc83006e16422f29aedb3fea68f1d610c67764137ff29d6602614dcd8dd4cfbf0477a90387dc9f8edaf98efd6c5f92f951bc8bddafb9a7011995920e2856140000000a3e8175333979d7c34a25495e82f87f7b6dd97d69657d9d899209eb85d30f0e2f51d330ed67b1084ffca737b2dc489f9d7f7d776c2678791608a1bb8754ead9f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2732 iexplore.exe 2732 iexplore.exe 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2004 2732 iexplore.exe 28 PID 2732 wrote to memory of 2004 2732 iexplore.exe 28 PID 2732 wrote to memory of 2004 2732 iexplore.exe 28 PID 2732 wrote to memory of 2004 2732 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8554d75b0eaaae328f08c98deafdc1c2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2732 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac8d9f23062bd41018886524f8689131
SHA125c71e312ad7df025fbf1f40044019a6310e9977
SHA256a76a47e8f928d585fbd6030c511cc9af9082f7a0f098557e16c7be5909687058
SHA512b8d726f87782f7771d2e7d02dbfdcd7f2f8bb5fb731eeb9fac92a4e2597841063be9b1ba5cbaa4ae47d54ec4247bf1908cc7c814d53da1730640060a2e75d547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa701315448b2b433ff28594ea7d100b
SHA16a973eea10be1d03e6eef4a62ad160124de445f9
SHA256a6b0ff286541bde9ab8ce48979a3b1a96f5bd25814d81bca4d81a5a84ac2f3e1
SHA512524142f30744140ebf56b3002ebd70d61a73f7b5a22bf12dffd53b224bcbff8c02bef47928478cee49bec1f03b4f649490d36fd68d1794d6b84a813205a50718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531f257c4b73ac94c963397db79103ae1
SHA1b457fbb5ac3599f30364a649db3829a537846585
SHA25602f93042bd5baca9f1b2349e98ae565785dd191a62738f780e7d165a449f3b5d
SHA512ff761f723d65beaf1184d2ac59255a67358aee21b3eb4fb5dcfe2d5f3b1b3c8d92198f602cd763ad53638a72f6eed3d14cb4194cda5e42df325ac47fc34eba99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ef78fce369accc6a899f7a6148f2cc5
SHA14d07b5a52a1a5e7c6435fb60e1ac36539b50253e
SHA256d6f11ec70b66b13b77d24b486bbdf39a480b1fc0673a69c6f0105ccbca50b30f
SHA5123fc3559c4289b25fdca9a9ee413e481c1062009c7038161f657b4cd466b93479239436a66cdf847f2929429c1cc91d9f0df32ad51e20f50abd9bdc177640aa13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c01f7f6e339dde3ac9f53827ebabded
SHA15efcfcc537024b7784b9ff4f40d61dca288beb2f
SHA25636844a44cfa5542b77ba4052c32c566c01fd2af9c61f89aa84db82d2273c8a8f
SHA5122ae49567d4cb889d45663cee4d776f69bc2d6c3362bf9401d7a528665bc4785c10b61276fbbe44129480f28aa6ef22ff7bc37e99c3861942c2ad355f6b4bcb66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58071498c1a47876fd672098818b9e941
SHA10bfe2ba7287f8f400cc1a135b7a3e5820a301103
SHA25630e79def5480ffb5fb77a14bb4707c515e13e8aa737b5ddb4c47d00fc58b97a6
SHA51271e66ec921ad42e2819e465e0ab5b53c3dd427752def5dc229769ef967cfa2b6a85d083e1e4cc7db33d05c6c23df1c2d1d9192984ae58970a438df98fe0ea626
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58024fdd95f49215908d38739fc41a310
SHA19594d8e917ddf211b46775cca13bf9677d2b9f29
SHA256326aa346903de17f7361dc046858236dd2dd0469f14746a628b5fb8994afd87e
SHA512ca95ac66a0934f1868ad2fa055a2875b40a13c425a8cb6d580e3f9fbf837a7dae6bf7db6687dd89ad5d1bc2f5ace0da97843f674ab4fed48a82939706ad2983d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f05d461296c77491f036fbf778bc0fd
SHA11ac99e4a1e4b6ce4ddfb68ea8ce666d82eebf4d9
SHA25669634e4f20fbc6f1e4e551acd6ef0c9dc64e53e4b573094a4f8e11aa75d57418
SHA512dd47878f00fe1ba0b86ad15abbd14c96c641c104ecf583396af3c157ff7070b36d62b776882e129650c85c73bc78cdd632619cdbd40fe6dff166250b9d1d4c3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b46ab79e79ebed2311390bd0495ca0cf
SHA166eb81eddd324b8e6c6f567aa88a20df684c3512
SHA256fff56cd35b9857870f690571a8cf62e274e4b905eaa10d2d291eee54e319fd30
SHA512e67a9c0c895730ddd58783c7008544fe39882aec26e678fea1ed14af1ffb001472b2c3eda1b6ef7db055d86e908475117723d6740976ef34136af3631bc0ab8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ae861c5504cecd20e8ce8da01f7d57c
SHA130f59344c66c0229686ba6a7d2f5ba78e5014dc7
SHA2562879ec4f916b051453642ab68485c18cd5712a217f4fe17212e955aaba15c214
SHA51247a4dc8f86c6ac9e799f292407ed2bf483c3355d32f00be957c42aabb94affa96ed9d3a03050bf0f92f16885e5352881f9c9a0064b2a8b82d8fedd5fdcc2ea46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a680bed4b095c9422f5bd1860cef00d
SHA147b65f5e7abf04adec557ed9fd078c4ff400a06b
SHA25639b138d2f47a3743ec4a9a3e0c22fc9c652145fa2388706873e0793a4eb1206c
SHA512b18e4599bcb0e61d9017739b2216a0d475c0c97122bd638bebab8c95105a9390b515e91ae977c2d5fde732033af15907c0a8344a47b880916d0ddce066e445d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54092df0ceed39f7d06ecfdabcc1609ea
SHA1f99f1be6e6537ee64b8226b59ed3401595ad81a4
SHA2566e24386e35a010a6fa30bbaf326deefa692779c82bf715da052763d14857c6e0
SHA51226b636a782102a7b7efd0b234037b222971da8377433f837c89ecc48395829ce87558a0bd33a39e8b70cb3ce8d441adfc6f7634ff0b478c429f9e54ddcddfdfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568f6bd3b2b7c88eb4b0112e4b1413065
SHA125243079dd06f98c562f384c4728d55c5bc66135
SHA256de06c2fa7b55b211b4f9b09e660f2224a911ada05cbc3ec6f7ff7a6f33631cf5
SHA512848029fa281882c91587a54a84422a557ba960ac2261a51f6c49d43d7cef720e2320b98e3b9f26de84eb2e47027b07d27a2789a06ff65888361e3fcbc9288a68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ecc107667504df566d551cc664ecbd7
SHA17c1ecfe05bce346d0137ace96db87944ac1bb13d
SHA2560e4121392fe64ad01fe6e04d44deb511f5d620567948c2825b22752bb137540f
SHA5123446fc0df649477072cbe7e627db68269eddf002382e77d60e9b6da1439d979d64bcf343b7a7e7cc99d9458bda5bd026f78a62b84ab4be1800be71a4dbaf1120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad782bc2f2f3e921724e0340cea66c15
SHA14f4bdc3f0d23f4f10f0c0b748ec28f25df873efa
SHA2568b9e4f7fd1679d9fc81fb3dd0512dc2d673bdf31fe892e29e4027071a2476335
SHA512b58ca0a40ebf4aebf8c4351744da73e23414b38657374bce1826ccab6d0d5eca7e9399f5b88d8afb84e3bf666b403b3e5fdce45780b426c451bb5be1158ad80b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53169286a7d83dfac0beb7271e965b8b2
SHA14456c0f9dd10e670a3fcecdf77bf3063b355ab35
SHA256ac2d9084d790a2f745057a658c790b9ad5a87e1ec03b709235c2faf1a7142a0f
SHA512dc0c4910fbe7b0e6fcbdd448995912142ac6ab49ff98af70a35b2f16924f5154cc41fad4aec2cebae93eccedbdf18c30757274f51aff840c3905a5a364a2a14d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559afedf42b12e7dd63a4d2778e72ba86
SHA1490b60af459250bdd91bc49d8a696a86865bd114
SHA2568fcae6bf9e87608d3a18db1a4cbeaf0539de5b37523045926a5d233149449573
SHA512f87b78b013f79af7a3f5ea909e6ffe72bb5373f0c8b12f48e259be94fe59228372910b4d57d0bdf98b02070356b39cf6be1e68ed69d6e17381668568335cb3df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c329ce91e5c54508a91ac73c22f3ccc9
SHA1f5c1e57e3103f6b1c6aa044eb1a7c2b5458866ab
SHA2568e2e40d6cdd57d98f1403b35cd17ce329d869860aeff43f44eb7ccc08c2c4345
SHA512bebf90ff3fed65a79e5b048ed17c85e0f970259404627e049ffd27a6eb55518e0ee715bc0a1682f60da594335497e6fd3df86c1bb58d7c396f8d4ef97fb5ccc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58df77fff167f47ad9e19893ef1071eb9
SHA1f666c5a36ad5538464e88c83674d8d03786aa10d
SHA2568152b54393ccdcb4fde3680b1bc4005bba7fd89d736a1532b3847a566739418f
SHA512ae13fa5f5676ad29f321f98c6e76002209d174d34a38a5e5f635eaff44f399ffcd4f27d13b539ae54734f5654a4bff2027ef3b713a16335b87f0ac151e8ff40b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b