Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 03:50
Static task
static1
Behavioral task
behavioral1
Sample
85e6685db6b69cc7b13999e3c0ddbab2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
85e6685db6b69cc7b13999e3c0ddbab2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
85e6685db6b69cc7b13999e3c0ddbab2_JaffaCakes118.html
-
Size
461KB
-
MD5
85e6685db6b69cc7b13999e3c0ddbab2
-
SHA1
0f71df7f8af1b3f1fd6330236d5afd9c0ab157c0
-
SHA256
ce6f730898ba2fa659b7c52a5563e3cc1b7fbee31ece7e10063a1dc7ca9b26d8
-
SHA512
87ce62daddc004851ef09b3d6d422deffa107e31a9b6d011c0053742ce6d2c5e69095ba54f112b6918764004181f77a52b4048be9297adc42f3cf87bf05ffdb6
-
SSDEEP
6144:SYsMYod+X3oI+YSsMYod+X3oI+YusMYod+X3oI+YLsMYod+X3oI+YQ:75d+X3+5d+X365d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fc5000d1a4713b45a5dd7b610203786400000000020000000000106600000001000020000000bfcd00a4b445b3524ff7c6d21a52d1fdb42324c91cc055db9b9ac1b6502a35f9000000000e80000000020000200000007101977aad3e46ecbdec8885c4f113bd664ad2e20d8bae1064f88e2c746786ab90000000a5b9155626d5a68fc3a333e67cdb391abc4b5a236793b4e0090eed85aad0d56aed87f8ec08024c688b7c86cc77260a996f35bbdfe91d79a2cf7168a6c8b6b2a6f8b7b5f8a6fa80b3214ff69b5d8941127210061b047000853fa3fede5bcad3a65d3ae292a31d1c6406775278a36c05732e98ad18551e2a180e56ac6c5586fe7e25e153006c15439807cd55215179035e40000000ccc1048925c7aeeced24c003f3b78d2faeff2906c0c598da5c8b52693442eb4496207af84950cca88ee699c64f3958e485d9afdf6ad3c9f618935ef04e56c2de iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E61F78D1-1F00-11EF-97AC-52C7B7C5B073} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423289287" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7041a7be0db3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fc5000d1a4713b45a5dd7b610203786400000000020000000000106600000001000020000000c75d0070fb15007da769ce188cb1615eb870b713c9c755baa34034e8e1e2cae6000000000e8000000002000020000000cbee48545c56a79dc998d6877c5ccf368aab6a789343cd48f209e1a94d4f1cbd200000004555f5f077cb13369d8054aeb49a8a599308e10f2163d3349f1ebb4a244a6f7f4000000031eba57208b3d1cd03c3036c96582dad792578c9c7462592721d690cb781fe9ab7c3164a0062c37f44374686591342f88ce2a75a3e0f90616e5700eef8323470 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2340 iexplore.exe 2340 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 3052 2340 iexplore.exe 28 PID 2340 wrote to memory of 3052 2340 iexplore.exe 28 PID 2340 wrote to memory of 3052 2340 iexplore.exe 28 PID 2340 wrote to memory of 3052 2340 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\85e6685db6b69cc7b13999e3c0ddbab2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb07b6cf119876586e2cfd02d3b47805
SHA1a7c7a3e7494f30dec909e5c8e8e8ffd604d9d52d
SHA2564327b01cba9feb8d6019e0af1d8e491d9a8f2e3880f999a908673367d6bbe2d3
SHA5126632f2f47f22e42cb03e32582f06804062e483c58692ac4d4cc9299dc3d9bfd8f4cfa255c8b090592dd478e0da9ec8dad02f7388489079801203d95b1b56b15d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534fc117bdfe24c543b30e8a77446c9bf
SHA11ab9d30add8f941ef4d6c1e1ea6c618d3e51ad4f
SHA25603a1721469d4b2cc091cff4b388b857dd133646917398faf753e1b79e08c7121
SHA512a06d36ea0dc34a481339c8e6f56391aeac945e3a9be274c15ca2a58ff8606138522449adc7538d71c377382b6fb1c8ee91240af9bd69f93456122e8e16b385a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cabd2a514f93a42a748b7d83bcd5295e
SHA183a3c835d75887e58dfa3684a0f4b2854d97aeb0
SHA25618deab0f6e9d1cece6172d2a1f0a337ea4952f3592a49a22b16c85dd0710cd62
SHA5125548089a41da2d9adff7e87a0ab6f6412937d9acf1401965427af1aae9b6e6d36e8b60c8b9407edbaf29e592bdacbe2a0a3e53f9bddc334268b3c1713e8a88c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e446efade935eca7924af5bfb883b85
SHA11544ea48f47574fd9575a57a765201d71d00737c
SHA256f8fdfb1c322cb8a9010fab34984140b6d60abf3fac3f32a9620aabdfd2b8a532
SHA512dc254732c17c86fbc0ee8f82813e8376e4c7cbd0a90b6bd0967d05d703dee7bc8820c4d0b23b4d83fc17013acf7b2a633d6a56a67c11554726300595c24a5c2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5274560f7a603eafd38d3afd02029d86d
SHA16279f216e6d81931f0034c328d18bb772be06708
SHA256f8cb61c42d1309eacda6d9aa39c2911a9f88fc54eefe49e262d46427c0e0dd8e
SHA512a0b6445678827cb53485d8ea70d6caac6bc0f271718fc43d492cb44021b35675762ef79eda85a4719bc0b5ff209a794128bde1f55626a6da0f290287f4516db7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1dac3e34707dd698454b14d13ee344d
SHA1c55e50f29fa029a2b182ff95f69b60534971c9c9
SHA2560f53dd99060cdef23d9216cf9ccf8ffb6507f9aa6f51910f3547cc95f232f286
SHA51276c2baa6cdc6c098f734cd94729a6d38638f8d8b66a3281ae111c2630b87e7e2d764c33dd5cc6371c153cb44ada108140346391a53bae48bff6fa6a0ecdcccb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a98ba0a7336809b5c8fc4b11232fd1c
SHA1e3d0107104b0cc667ea091500d93148f9c0405f4
SHA2562e30ce9b14edcba803e554a2ae1624189f4969a477bc8c8d6a763417688b35eb
SHA512788896169204ecf253802f0626317ddffae8863c7877b203d93fe558e64ec1c6167178d89ea0ed10dd8925258fe3b47fb7e847d7cddc5b62014483983fbf51b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3120545c0ea1edec1910badaacc1d9f
SHA1e61d5831ea3249f036dcef8fccaf6f2299b60207
SHA256053d96501aa058a6267f132d9751c7e23abd59cda397cc29cc9a04981a241263
SHA5128b4831be5c98411b2442aa72a02a20eef799e7107f3dc04ed4407bbbfa4120022019dcd91b7b1f057547173e91c596cbc5bcbc132f17a4803c68f6efe8b2b05d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593383d71e1774996c8de4027310c3144
SHA1fc63ef964e7222430d33f1e211551f3425c9458d
SHA256ee94c4df3369fdd46c3c74e6c82bb0650a1bbb6847c25db0cde5449eac268bcc
SHA5128d74b23000872ad3bc941bd280186fab4be96231a7d7c0fb9887b5bc36ae9aa80e0dd3375029a4886134d1dcd997f467ca0c75924dd3f4082da3cad52d46b02b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e828529c8579bfbbad488e2e90ed3ac0
SHA1fb082f5a90934e4f422b310272b2bbb95469eaa2
SHA25657790676ecede677914f0d4ad84e602327108e7ccd43cf84cd9c442d5b54abe7
SHA512017a0a5a4d22bd11077e79d263cb871715ba1c2dfadb96521ccda4ccb970a3be523934d8d1ea725037c592467f6fd38933d8e2cfdd6ebf79d65d86ed5797c042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504348ce365a390af515079b4986a35e5
SHA18486018e288ed24942bb2d7de573e76412af72bd
SHA256ecd765a9ca016a0d92d6a02c1da84622b65c0fad26f12703b9d6b208f14bc7c7
SHA5129bbd7cd0bb754031dade768429c9ba6c52290369505a798ed4aaa449546d2a6f5c8eee182f3749d4012c470e78ff97858b73986b203661d62cae1b4bc3945555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5818c3d6c8e7e21581e164022d7e6ae28
SHA15690d09dd8f3b630c38fd8d0ae854e526543c3cc
SHA256843c306a0224fe86ac799af6a18ad4b6c594c47fe9a9616a7a5fb90d43997faa
SHA512c4d14ad4a2fecb72a22c1872d27f6c6950ee7fe1683b83de4b0607b5238f4fee0a6be5b9a1b54125d12e7655a75e5692365a160492c43a61092df998b6d1fe75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fc6ae4033903a0a7e83ca4d2e5a374a
SHA19f8f1a9fcc41e933bea431cd32932a0bc5410ede
SHA256a8183b270fcb37c414f32300d22b51d0b57dafc272dc291688a5aa1ad29fcdab
SHA512bd30e38934692a31a9230ffbcff4e51658a6bb0c6db7e9e15a51d7d899a9e5b13286233c8495680f4745ea914fdee398eb2a7c77257eba4be3c0b6e83482c37b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c21f07cbc345b8c937b9e4b9248a4d4
SHA116aaf0988cc4953f4a27702a0179c09c2b3ff0a9
SHA256f761b05a0fef221dfb2ff3e2bd36f0e7aa5a53f1fb9a8eeee701f663b9fe05c3
SHA512d9c47eda64e87df268eb3ccc3e7184b99133ec610228c7cc02a364b3f6024f13351b66d09c7308e29f1a373c8307a5bbfbf68e75f6ca8ea84aabeb40e4edd8d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58529f18b8323fc97dea8fb282095b08c
SHA190bbed7a66921018db2154518315929ba2e65fd7
SHA2560adc1e4c1c893b3dd01dddb55e49a941a1f9ac522e7a1f795acbc023b617ae28
SHA512d4fa5f55878d58f17ad84cafcaa899bcd0b4b919d7404f63f4fdc41b7fdcd58a50bb3fa3e39809e0ca0a2eff5349cd1d2e84fa02d3e4dceb99ddd95779218156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f37c9edf99b3070ed1a3944093a51843
SHA145f38504347066266ca7f87d080e98f3821c65a5
SHA2565559514d99e37915cab37433f56bdf26cc4fb9772b213a4672388b00a53ed6a9
SHA512daeeb1efded277e5469cbc537885aba59dc9f9d584dbbf2d9d49b28d165ed15fff2eb35ded1188fffd2f5c98d1fc3874557174a783bed3e772d89848a290ac2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd740eed4fc45ff15df5e58a7ac1a900
SHA1a965465f05a28c6278133190c452edfb9c7949e6
SHA256ceeb14d8f019590cff46ab0b36e22e20b325f648d8ac2bb7774cedb2c8835db4
SHA51251039381f0f1ab27b1af47bc8b7e50f2e784fad8450511b0a30fdefe5eb221243d25a033a08b6e0dc35e3db257788e94bfe70a3d0a6642167693ca4c6a259fcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55537d28c756662cfb8a94a2e3b714cd8
SHA1385d311d57cbf2be017c21bc0ff832aa83e0f7b6
SHA256a62a0fa62de0b556facbe8c307c9ac5997121f763b6267044a5f94e877d407e1
SHA512e7ebe215248219419015949fa992d70039536c9ef829be2c366121df2fb3e02a40650636eb9701882434081501764137dc59527bd0a8e19a26fc574a7ccdc393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527c7b10a7104c739e658d1e388246cae
SHA18b8d28c20e7256baf42e965debe9ddc874e01eb7
SHA25698fb1071be891c8ca22c4e4dcc67409c1355e0bbcadce06858daa8ac68b1e105
SHA512180c2bfd86ffa8eb12a8ca11856a042c0c5447fe338a5ca5a0c0c4d27f2c81c8fbd29456eeabfa8625dc59fcafcae885478bc71b483793b4466f7e76666b3a20
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b