Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 00:53
Static task
static1
Behavioral task
behavioral1
Sample
371771166b5ae074888355353a392751_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
371771166b5ae074888355353a392751_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
371771166b5ae074888355353a392751_JaffaCakes118.html
-
Size
6KB
-
MD5
371771166b5ae074888355353a392751
-
SHA1
68e0194eafb7cd47b0850be16264c9e1ea9ab818
-
SHA256
d0634985edd543767ce06f857920de53690a684d79d0092947de070cc8e6e3dc
-
SHA512
1e77fa4ed8388de91f1288a590af9964c7edb81f34eff3ee3ab5298b327ac0370c03466049eca6dbca1c2b508ee7638f921e586b2b9bb2837a661d449dd07c5f
-
SSDEEP
96:uzVs+ux76/LLY1k9o84d12ef7CSTU3p/6/NcEZ7ru7f:csz76/AYS/K4Nb76f
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000003a4e77d4fa0602615ca9f1823c8e38c999b59ee100485d927872752a767937f3000000000e8000000002000020000000a3f7aba5604c5199073a06705c11532f8bf4893124c32056cc7542eab2ebab9690000000269e314a968692f1f760743644e7f162cc14a718696a4b2af4b57c357accb585b5fb855c90795101d7feca67b2a6950513313239501500ab8dd1539c6303deda8e774daefde27e11297d491b5a663d24bf48f87ffebb4826e908e73d383c0a4b1a6a33dd07987651b177913b005012730779d8a83ee5888b561d6cffe8cdb06d85c288bcbb816fd962abcd4517e3ad764000000041e9f3b1b060b081d81fdb8b7ec9eca84cbfc94333f77ed8c02630c5dafab5c183d7210ee7b9de61be5b55ad754738d51a496e0a85351ce6218eb595793f4049 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426821060" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d005e4e12cd3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000089a530d33aa7514e58bcf73d05220c4301ffa8d792bd2e1f5f79bb06257a5ed5000000000e800000000200002000000079efc284f52640113b02613b3558c4473b497b3d91f1f550778a70f9ebdea8c2200000000b0f2d2f6a81d5eb52b05235942af8bcc959fd98c96cd7e200c4b7d3789e400f40000000a0887418d050dc1925e121f67b118c394105d93708aeed15b9d3809bbebb13888a7d9b3acb501403edf3ad1c51993897264bf9c3954f5f3e798f12dad0295818 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2D7CDE1-3F1F-11EF-A173-7667FF076EE4} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 316 IEXPLORE.EXE 316 IEXPLORE.EXE 316 IEXPLORE.EXE 316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 316 2120 iexplore.exe 30 PID 2120 wrote to memory of 316 2120 iexplore.exe 30 PID 2120 wrote to memory of 316 2120 iexplore.exe 30 PID 2120 wrote to memory of 316 2120 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\371771166b5ae074888355353a392751_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b6edc0452ca1946077d7c375c110a7bf
SHA1dda96d2e0789e48728f470b0ae37fa7c92e4034e
SHA25634f5716c9f4b333cbdd536cdbd5eca63880208f95248643b083295c8487c6564
SHA5123f4ce11cabaec80287b14c52c3094ce072df462a9eeaa57954badac9606d8045c86d11d93c47301f2159c06779bff2c9ccb0a9e102e5e1a7bdf45fafe2cbe535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD514b24f561efdf2728f2e412a3b9ca3a1
SHA160ccdd5c5a44bccb28472abaadd2972496480428
SHA256b25ddfc56dd4c1ca34061f56a8b2b54d789b7306e0e9794dd1e05b19e43acdc8
SHA512ccfa8fb47e454b87bcea8d500060340b955df0849a241ea2e73d0202fd3566e6944f3696149280fa568b6f2dec3b2141358a0d18af567ef632fdef28dc7ccb30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e2209ab52a0773a5b65a49dd7989d63b
SHA1477bdbaf2b5d05dd43ffb84f8323d90dac802bc8
SHA25683defbdf6f93ce4f4e24f20aba67edc8814a118a20c7f96ab90a55820c386824
SHA51298efd356d5eb4bfd70f596c9f5795740c6b28cf0d7e728a2b13d96cf58b22320b2b4e7c9ee23181deb05b9087b694203902082457c43b5de3d494c9511d98681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5059d3cf255bd1a46272ae1f550b8f180
SHA1cde68a8f57cc185420581a3d10c7d73d8546b7b5
SHA256f7384ddc07d9be0238968c027b7662b7efa8d93c1e85c634400bd1a6424d4d7b
SHA5127284c7d1e4f9ad2971447afa0222bf4b598a63af397b2cf0ebc0431b447a7d4cae039e8b6783a981ad0d5acf50c5dc7286f09de1672f6d0759c7fa72022dcfba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD508b62e33af5c5679741060d39f6b96a2
SHA15bcc89ec52f9fe2c2f8727ae69a653b8aa82e044
SHA25638c5a368a5884009ebaa8e4817c3c22690dc137544ac0acb1c4f99cc99827ea7
SHA5128dfe3b9b57b41311d472ed28d32ee24ddc09ead5d81ce2ae0b4fcb00ba406c0db303b73d49422114f257566f26463ff20c513ec3dbb98885bd0c72f9e4911993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59651de3593c64a226bf40a52720f2acd
SHA1bf48bf95869931dd92529879a37b930e1ac08afc
SHA2568f738c114af3994c380ece8285573d1a3d9edd6841e2a9e9a99c485656e66b75
SHA512ce1e58af0362b57dfbf76ae01684f5a8aa46893ecb9d868679984cab50af0fe5412488f822a3f9c984b1114656782c933640c423fd23701fb07c3455aea0d860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a2ed2ba9d8ed0f32db2d65dc68e4f481
SHA1116d145db33d9ed98afdfce508631fea49eb6a1e
SHA25620b77d3f6633fab9d81e69cae367939d28fa84d66a370f6e76d1fcdd1fbbbd29
SHA5128696b1731ce0a7ed1b220b3ea2f1a6f9a515516edf97d2beac9a08bf0ff75136227159c17fe22af9bce2826876c88bb68215e7696d92d6ce24ccbed1c4c2da06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bfe5589dec2b5420ab2dd12d985907a8
SHA111f2a9e2f25482de357d9b0c658021059eef545a
SHA2563be2bc19e91a852bba2e3dea8162f4b36a385147de3c4dc71cd9eb9a90fd44dc
SHA512684730c8115707379d85965af5b1244a397a0246e507fff697a083b90e9827c32bf06e54c5a491a5e52fb94f14ba91e4eca9257a8f23c165de0aedccda86058f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50a9e1fee5cc82ba21aaffc5c89e752c5
SHA1b95f2c93af38902b042525700ad2f57dead38083
SHA25666db97f82458d932ac4bf7b53b862fd09c2b8562fd370d8bb5a0924c5a02e267
SHA512f42a8c3ac95d6a0b56e7b28d1bb9163b119cb2de35780dafb6841bffdfdbe11c29a663b83d81f03abcd377ecd64c46a925910743e892d07cbfd9835af9834f51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d9074e39b8319eb84785f8cc8c60416e
SHA179a3025ae58e6c0dd9ff569b0928337e804efa7d
SHA2566d6f7c2d88ad01e6bd47ac2faaa71bde255791344ec0f72699cd2a38696ab927
SHA512d668f08cdaeec5e9127a5fd7b14da423841a1b98a8ee9fc48b1d48cc2ff8902808eb0dd02778011f9fdcdfae40b29c51cd22dca666475522438688a225065316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5758fb11949f862fd2d02f1f389cdb0bb
SHA19f9ef51fce61a18842cf6866df8da9428cebffeb
SHA25607bb62a09d829f8d6fa6f4d0f3757f5cf25a2d40fc8e6d8ecb6b00c10457cfd3
SHA5128cf8e4294e76b1205ea72cf1b5a48e2b6693d0da1c80846b48041df739bc80414db80008c445adb033689ccbdb8c64f5e7af2f745e6b24a3f46fc8ed90b2bd4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55e49d49d445be016ca2cf9e9eda8c01e
SHA1cb377f764632971e9ebc381ce2a0b3a993317759
SHA2567d5d77d6c19be723d91029bb7a521cbb5bc1be307b207bba689477a04c5cf856
SHA512f3ec0e0aaeb8ea74cc43a5417b52aaedd543c9bfd411abdd66c59ce606eaa7a50908ab17ec090c39a16c8c809ae9b2ef1293060bb783c563c5a2b37939678846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ea46ef88c4cc0e7f42fd97f59cab3d7d
SHA1ac96fbe6d882796ee856e8a22e42d319d74481b5
SHA2569558bc06858f5bf81932c2b68ccfd8b6c6b79a66f86b1822438d74514e830bc6
SHA512066a48fa10f201eb5295920add776897a9fd56ab6fd448f2318eaba511d002c1253232f27476878ded8961cb7a6353f66e7f77ecab8be3cd61a2665b2cf63728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD513dd654caa76c414c1e7c7d32a570ac9
SHA105db637d7d3624fcb5fd5041a065ade7a5a4b7fa
SHA256528d7a9478d9de8bfe4da113100e7a406ddd2c643286f3d1d66eb13923dd2689
SHA5120215c0f0fa606335e5cd05a095bc58c87600910c682c7a23a8a75d260bc3ebf2539902d9ff8ae1277dfd65ceb452e84161f9c0a53eb93373780c9ec2d25d67ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a152f080aa9a3ae2a082e206e94f9438
SHA1a43b880af290ac6e444136ffa1ab65656604dfbb
SHA256c15526d354ca494176493deaf7cba2addf75c43dfe55e29b9c19abd1302bf7b7
SHA5122d641cc362bf68cf727a6c99542fb5a50f72e531817ff3cc4d2998174fc3b88860526e0e8a5846cb1b303f48af693eb523ed1623d1b299b6251c4881bf80b46d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b1f0f26374b1bca34e345a8c0da79dc0
SHA1bc1e0eaa092d8fc5163125ad5c44e3a21e4aa7b1
SHA25695e2af11aa6e434be3ab12b5d78473c2433ca516f98cf9a55e167f9651bfb1df
SHA5125de242a81c352b5493fad60559af4447297a0e08043bb23e8303d725a80d6dfae62e27468efd37e012df62cc1f5b5618d26e2343840d0a0ac22eb63934625968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57caed983eeaf80d312c042bbb67e58df
SHA16569703a9a772f99879c9c950dc8375d9be4a9fd
SHA2564dc53daa5ed9e7604ae7e27cf458b1a2093a3f629f90aa900c50a71351c52431
SHA512b85238d970b5d6a2280ed805be36917c67cad87bfea72c8414437d9ac8ad51951fc679c37d76d99c3d28874010dae862af42ea182903f768b03103d5c94c586c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56b5c2f782d6c8956aeb0fd4649cad73d
SHA1ad06f79a082772590a2571f7844529081e0946b2
SHA256d2fda34d71f6acfa54e8d2b759c65fdaa4953387b73bd7f9bccff3ef690f0288
SHA5123efd451d7270c346e3ff7bd89d7429103f5b9081ac598b7e6a6035bed24e5f6da7ca3613562ccbabf45f261b8a2cb4f9c769459ff1e68f270aac06e71e8857fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59f677bc1f348b8c240f6d452561e5ece
SHA17b1a63a7b16387d23f70cc573cf01d58be09e632
SHA2565c370b1a7cdc705f27b57e48f4fd21fa09448cea4855d2d2504719ecba38932f
SHA51289c23a03b7d4774cec0f2c121e2012023020299e50aa5e259cfca8849cf0cb0d790f918ab3ad14061c52644a578dda449f7f8b49a4d7fd64232ee49181a813a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57f8db10cd59d3690ec43615cc1adbdf4
SHA1c500bd05c26eb90d07b4b9ac71d5fa1c5bdb853b
SHA25652e6dfd9f472c836c73ad428ed2b7537870a4e44a35199af2aa8939937c27d72
SHA512f3b96d8bd7b3ac0f362127a31eb68ddef84e766a9e1d74d66c189b6cd0376dbaff765e297d5d36cebe69a3cb90c1ff694c7289a161253e70afa0fc4205cb625c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b