Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 11:50
Static task
static1
Behavioral task
behavioral1
Sample
b35b2572bd29088a07987b49c537f40e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b35b2572bd29088a07987b49c537f40e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b35b2572bd29088a07987b49c537f40e_JaffaCakes118.html
-
Size
25KB
-
MD5
b35b2572bd29088a07987b49c537f40e
-
SHA1
995e68941d34ddd5265872accebccf44bd1887c4
-
SHA256
65981c560bc07c9158bb9873056797b4fe9f6ea83df6bf90325f87a05ccbdabe
-
SHA512
220b101b14e240f1cde311226556c5887b7d8b6a9bbf18d179c147a3378334023f8a0bdf17cc2a2c783ffea153b5ac1dc2b5d7cc605ad765f00690534ec63959
-
SSDEEP
768:HP+he2XwgwBmo9r7GFiM1oxuEJFhzF198YU:HP+hjwgw0o9r7GFiMaxuEJFhzF198YU
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c0104986279a5b4a91aed7921ed6711c000000000200000000001066000000010000200000000802809f1f883d469dc2b8bd97b3f7ecf356fc6b275fc83bf5eef1182908c8f9000000000e8000000002000020000000ef37ac452d928f0aeeb9fa4d70e3d00e1bd6de87cb3a4c9b98e3128da814327820000000739c0b1af57eb0974378b9bf07561cf087b971aa71a4dfb517c08df1f5688dfd40000000ac64e8917ed62dee62937f57f9dbd6266c479b48a2e48192bc2676e2fb32d6da1d8876d2302b962b3def45beb62659d26ae1b1da1473d5492d4a706127e8d81e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424700484" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{99170891-2BD6-11EF-A965-CAFA5A0A62FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20a599ade3bfda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c0104986279a5b4a91aed7921ed6711c00000000020000000000106600000001000020000000e30ef2d437d755ea7b9c2df433d5b3baccbf9b7f0784a34de2578ee2e8b94ab7000000000e8000000002000020000000da9d352e72f470fa13046b5f16cc401017d194ea80776bc920546d9113aaa54a90000000726aaf71c9b20c6c25a3645fd8bfc9b146794f8db3305e70d2f04da946f2b523d4a9447808de05336a1161329862a0de52a42306e9b9457a0f352d64fbf9eccf0b07f6a64dbc78cd3588715c27f17a3a3b5d7bf75ea8ef230b231918ed6e3d04eadaa52aaad29fcdae245f851c2adb2e699fcb0bd29fffa277d52f1e782afb4b87b5cb15cfb7c160408c15714227eaa0400000005565103ec63267a6985b6324003ebf19405f748456ed930e21e1f9cefa4541f8dd12cb14b0831788196d805374d3df605a955f68e67418ce3c5413a10bf82421 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2096 2872 iexplore.exe 28 PID 2872 wrote to memory of 2096 2872 iexplore.exe 28 PID 2872 wrote to memory of 2096 2872 iexplore.exe 28 PID 2872 wrote to memory of 2096 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b35b2572bd29088a07987b49c537f40e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5cb960fef171576bca8c4455f49e9bb
SHA124aac6ac45a49572686c1eadb857ddbc30a9b402
SHA256d2bc750f62ce91eef7a3ddd8fe2955ca7ae040e0c954c9b506d00d0341aa1c53
SHA512d7b49d3184f26e7cb038fd7d64a05aaf0adbb1c95c6a1a1d2d09e7dd437baeeb3335d91edcc47f0bd05e1ce5b2e28de3727eea5c0179077de57d5009d374ec13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55554e8ec8590df3fe1e1cd88050867df
SHA14bc03d6a8eae631fab22ab65e29c68da52978c4a
SHA256da937363b51b94320154e0d004bbe23f267fb7ec6931b582fb409bc69aa8d828
SHA51213e92bfdd5531e905adb018127ab57e98f83947a5cbd4d91a5e7359a939e238fe1cf6f0b41b32325f74c7c9c1dee7f19a3d05761ebe28a74aa2eeff428f2148a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adb86c996cea5192349d01eeb22b2991
SHA172bfbeac77b60f7157854820eded3d2e081516f1
SHA256ce408e5ddc3a902750eecae946ef7747e02f5cb765cbf925aabfe8ac34d424e8
SHA512da2513d155ea5aff65257222d93d8771a365bcdbeaf8e49e397a6552700fe1c30ca15fc9ed49793ddd860827259e31d04cc8655978037ca5724571f7fbdc7aec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ec1ed6d64d0dd7f331f75c93912ed8f
SHA1f8b144a0959b6e838a483d22ea7e67b332b74648
SHA256a0f1022706e7719df55f962dad9f43826b24864599694ccc96f8d40a61e56952
SHA5127b6bfe5ac1bf7063499997a0cd32b67cdb71e852497797d60f87a873c434c788b62ae86f54fffc9ef40073872dc9da88d653790df80529dae9b79906b9d19c0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bf1ca098762250e086908ebc2c2ef8e
SHA13e3bd6c497669e6582f4e1276e229e0dd9d456c5
SHA2563f672ffd8e7c2a5e498cba138896b5e103eb39652f690b97828b3927699a7939
SHA5123c28293080c85bca16cab675b0607f6a6ec93253fcafc7bd9ebb9264ae33d6e8c97a9739b6a0218fc77911bc3966cc3588910ce3fa7b83227a7a85e1b2302147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d6244a71319e7facf8bad585eb88aa9
SHA1aa25c7c9488bcdea2bf280aa451c4257e69fe05a
SHA2560db4c789544f9d927cfa8c385923730f44cc408fa98b8079128c2488ded0519c
SHA51296bebb503888076f6eaf90f25267e335dfa2e55780134a8bda8bbdd78dc6f4da81796f207694f023cf96065b06f45e36fa34fae99c0ab43a3b607907f5d6cf31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577d44ce9a71d14c2436124cc48c48209
SHA1cf1030074b2060a12c7fdcdb78c242c0d575ae6b
SHA2560088a7f01561f5f3ce22a2fec173400d12a0271bd847b79b439d4fa51d02e55d
SHA5123a267dd12c90d4aaafb80dfa58106869f4af4dd86d4f2efa9233a762c52f00a839d93cded28c25e09379b37b583a13b19ff785f7165dff025e2cdcf9f12c7d0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5520208bc09c183b1af5d7a8bc1f9172a
SHA1917710073c5261e6ef26ba86b7f3a71f034feb06
SHA256c9bbc8fd01e1758fec327e51029e5421385ee7b5317b320616154de1b550dc15
SHA512f76af2c405e7e230edcf62012b2c68edd6e73c57ca6fd2a04530c5526fdbaf0b859f5b6db24362f47b83a3dc01abdd660e87ca0c67d4f6167437a6b2dba6103d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b59f08338c0dda18c5507d3db40f12e
SHA1165d58dcb9a3982f9056b7041cc9c796626ada4f
SHA256445079708882c79c107e67f529ec885195b94b58175b83c3a2a255f7ca635103
SHA51266299812ed01729d2dfc0e91a33db5bf66b6508398803b3c941af101966aea1e05d0076e896edf0d2ae7ad38b957000ada149d04679973ca28435442d8f552a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562e91b7265a657006fd925bc91f95f51
SHA1523e3cea1595c6665704d17d61726941b7894167
SHA256a259311ec6e3b131aed7171f677ae6aa8d53f70d64ed4c858d503c6cc641b195
SHA512aa01ab60e36be797dd79fae1350b86279792269b8f2f68deb9b7fc09c00b2408e176a92dd4a612652c7636eabe8057336e3b81570b8b2a72ee9c67d6af77776e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5b0e88295b61ee584d774715aa53302
SHA11b8d252ca50c05e0feee4f209f31975693f0bc9c
SHA256957e68b8899e9e5b56839e90c1d11765d15b5b6c836f13a07d59a5c15f85a9c1
SHA512d3fda7ce2fcb5db12c888de589093a4a519515b8c66fa1847a4ee6dd1e937f0edbf8dd83ef86596b5dbafab3ba575b640e2eccefc8404f41658e8dadf6c63926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b994f07e185911f7c9f1fe866086bf90
SHA1521e139cb33b2c1917d5e8229f03d6d3d4be0604
SHA2560b8673a11c5bca0161ea3e3f91301bee70c465f8306de869234ee71d9ca0d714
SHA512e1cfd58cfa14127ec35ecf7377126795619bef7e99cd583bfdfd0d10bcb63ec5603fb80858ed8200d19faa19aedb9dd7b96f5cd3d6692568a1da12230c8595d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5142d366c584ab3e73fd446b080abdddb
SHA14e68a9c7d4e67d82b57a5ec069b3530628f9d833
SHA25683b4c758f74f9f27d970e19adc14332b70b09e58b86b22c96e890bdc84e2229d
SHA512ccdeae5cf70242ca578f65c4cdbc99bd0d60613b7406f5d1a522dc236072edca1cc2a40a3b5cdba704e15d97da4fd3c3ea96b4cf78b0c8527283f73662dd61ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa61673e776bc581f45e488670ed4ffb
SHA1e03fdd8cd56d7f698106de627ae0db3f0ac310b3
SHA2563218b1343f446a62cdfb75b9992f2667559650fbb2c3d5d2a9caf2ee60f41cbe
SHA512772431886b9c1ddbabde83bd97b7b40fe872372477295e623881856d2a4530867159f133757f88bb72ff03304cff8e33543a83fb7a6d2a90a4604c87c83f7ef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ce04d5e47075ee8ffe8a0a2bb594f11
SHA15a7ca6dfa70289afd3163d0fd18e07c80d1934d5
SHA256d0c7d6b978523c8d2e0d834ddd7b3885fec4135b4b0d484c5be369c6bdd409c6
SHA512b08f5022b7c8d59ea94600084d43f771ccfb33a4251c15ffa518712d2b6cc2493958c7363c6e81b60b0b3806cbe17ec435eb756913b2821f444a4f28d0e7c1d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526d3e06fc93a3264fa9f4b81e51df765
SHA174b16713bdd7a4c2a956e14a7b12d9b6c363463c
SHA256a9ecb2b55f3f5a1712c56276661dd597f2d8696ee424e42b1dcc9cf9ea42e832
SHA512f78febe0438769a75f3c08e409baf1f00541ede4c2ac11598aaea7cb1817af9e337b3c6fd14b83e7bae79325f618f03882e9bbb1896b38c22ddd81d9f2ee840b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57205d10cd261ce5ca7a252618c5a70b1
SHA1c89b72aa7ff09bae8a9d0fc9942831d35944ba63
SHA256fc7d645b63d86279ab96b43c3cf164ae320e3ff2f59455fa73773ef21c192ad4
SHA5125ed8eabb542ea40595b84fffb789a07b8580b0b6d64ed3a32bfa728fcbbb1c3b9e2680ad89a8099341876a096e7dd148f748b7be4e0367992cb98eab5bc6c5a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab91e838af081323a8130b299fe7d108
SHA1cbd90f4690802efe511c77196e7b204584858352
SHA256e39a3a9ae6077381a3163adf175261b08b3048d3319c48a3a5d9d9544c63bf65
SHA5124ca01a13924cdb215d719b0d4b003db2c8cd3ee04e379c5480f080099c992d8f633cbbbf49991ce3785b020f232b3ea49d1b3a1eb6fabc29e6bbfeff2818cd5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f471a610838e280e80c89b9a42bfa23
SHA13839f154e1b1abc329b13d5b1b90bf8874515f20
SHA25629da550b92e4c47489ec1f4523b3f6a62db1153d5a8ae0f400bf569602dc5f80
SHA51247f0a867372174fd3b056d9506f6f50c46dab3555af254f7e70d589282532bf9614c6f1ef2536ef74148a69d36cc7dc076a6453fbbf56b1d070f8a39e8048ef6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b