Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 08:19
Static task
static1
Behavioral task
behavioral1
Sample
3ca1ff55abf9d1f395212c6ab4d6a06b_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3ca1ff55abf9d1f395212c6ab4d6a06b_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3ca1ff55abf9d1f395212c6ab4d6a06b_JaffaCakes118.html
-
Size
58KB
-
MD5
3ca1ff55abf9d1f395212c6ab4d6a06b
-
SHA1
87f0102ba773e5fb142ce2f3ad800cf3319d0a8f
-
SHA256
098e433ce54eec288e9bc8207894f1b0b85893d194d2e001a13c10060f11b8ff
-
SHA512
fceffe3b60e4bae50733305c3c6ccc0fc6cdf9c51aa89e7eba9d04875bf34e9c6ab86704fefbd985c82672dbb5c62c2dc1a47be488370ce3ec2150c9a8a70667
-
SSDEEP
1536:ytbGd5L2Pn0Gbnw1aJf8jLKDfOw0pwQB9EuI:y82P0GTZk3KDfDPQDEuI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000004b3e371fba2394a5d2903c0421e7eb04f604fddf800c4d6f41bbff1f699c4cda000000000e8000000002000020000000ec5243b098d1b082a740b79ad5668c56ffc99f43de1a99062bbebd32d84140222000000095fdc6bc4964eaf3303a2c0220b4f07ef5e8f6405aaa49f8cb88e92e30ecc7664000000086d985a6fa97e8793bf5ff931c9e8dffe2c76d1ca9a16c3aeee4f547a4be237f0ade989c6f7ed55b9052c739cbd9621eae1cbdf4bcdd0e0d878027cb76d99e34 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{675A0631-4027-11EF-98EA-6ED41388558A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 707ef13f34d4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426934212" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 656 iexplore.exe 656 iexplore.exe 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE 2996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 656 wrote to memory of 2996 656 iexplore.exe 29 PID 656 wrote to memory of 2996 656 iexplore.exe 29 PID 656 wrote to memory of 2996 656 iexplore.exe 29 PID 656 wrote to memory of 2996 656 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ca1ff55abf9d1f395212c6ab4d6a06b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:656 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb2a588c036336cc1a05afe95ebc300c
SHA1c29d06e6c185f4e00c99c29b7c509239e26aeb6e
SHA2566ac7bd24f453fea3543151bf8b71b0f5c4c354ea5b1063a3e2553a9cf39bc8d9
SHA512045b519ac6f5e01671d133cd7c6c35643055fa62374dec8c6d1c3efc72758efe67c6e052f3de0b4db439efabda87212356fdb7c675fb3301133fbec1e2b8ca10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50520aa6f41d8aa5da2b93f5b4e76ee79
SHA115a917cb8e134444d6e7483d327fad2b1835d5d3
SHA256b27ab5b5d4ef0c21f90095e11c34a295e32159fccec0e02a9fcadb0acee2d3b5
SHA51228a0d2f49539e16c57533945610450fed70ae25f4403c14f0b40bac54a6881044dc5f0282e9b561bbdb473b5c49f3ce93928e57ceeed4197458fba26e16d79f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c13fa7ad164394545a9f3a2a3abc2d18
SHA1376dd5f54968dba0fc34663da4e3a54c97d78724
SHA2563ed079bd5a3bb2af3d8799961420cf4be2235887f51a258b66fbab3e8bdd2e38
SHA5123020a834d32b21d5a867dec51d9ce23f0dad88f13cd1fedac763701367f69a91d66b16e802aad6916bed1c09ba822ea4bfd532f556d76a86aabd298a30512eb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0fb75ce75cd985807046ec115dc36f7
SHA1a79e0eaf44f90838dbb70d52c5902d54d514fea8
SHA256fb5d3a2014efa1c994008f017f0f82d77471293844fa3cb949b39546336f8e55
SHA512e2669aacd821965408fa07d25bbd4fa15ca49ff87a7d5b8922c9377e0cde4fb491118a86f513fd2cc58aeee3d82c07c9156d6fdfe6d300cfb5d9534d29e49dd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b9ac0339ec2640c0df2902619dbb535
SHA130799ef7f25403c8643c69cb33fd41e9c8a81c06
SHA256e9e0be51b58d8dc2f18558d8c2b32e2228bd7a255242bc7fbffe9ed95f058752
SHA512e0c5dd2dfc034a800ffabce6ead045bcfae0caf5bcd4c19785a74621c61df7c1a91bc62d4c924640461c4d06a67d8625ba17a27cb682d83b17a8b9406c61b8f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf4657ccb37a5d36a7da3d19b95aec5e
SHA1e9692caeda48f3981c79119555efa059c80d95b7
SHA25698b57ff24cbe9fba57b2920c0c0c4a7fb9fd8793ac9c3fbc3e7e275a57e0ddb5
SHA51203082591d64e81acce1ee209b4701b5f0be1d791c64cf18f042cd68f78abcf0ae73f9dfba9ca62ae935913975567f34366fef644b6c33041f8344984e9a56c0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5380de657041cc5cb58499f62b576030a
SHA1f34a309f153907679f4da07d591c7954577569d9
SHA2562b650ec2e6271ea813698a10753a3f0fdda9de63a390b7f96f1233f135e23a27
SHA512e5c33b04efc8a83843de8a646bc22adc3e491878d07d11aa65ae0c4c73ee36d64adc71c12f276600216c9508eaa7fca27dab71c5537fb470a0962d0b21e9812a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d0b84b8de6cb9dd7383ba2643a23ece
SHA14c9e6de23fd47960688c918c24ff5f4701651541
SHA2568ae36bb7ecbebd4d007882d98a71e8ad114d5a7036f673f053a79477da4834ba
SHA51261a754dc548a0a8e367e751b78d8d2f866976d2e28cc7ca8df9e6bd56aa1787d0123dcc58242825751a33b3c13989ba2c3e82b3122f4b92ae132daebbf3dfedc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5709f11da6bec6de5b794e22f5222b9f7
SHA1cc07e41d6cf92a5c2c7a2f7dce99579e9e99815f
SHA2565b3829723b6f72cfe3e47f5e0578f9075934ecac108adddc12b0dd09e7c267ab
SHA5126c6a680b1d7b2a289a73335ebd63b24163e382ec13e5f529f2d043b3da2ed4e81e5c99e119f53c731947260b3f144016bf2e74dd7295bb116da49ba12fc3fc1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5748c6ad6437fd13acd22d0594a0a9a47
SHA1d72ded25b6479357ac27ef3efc1395b451be215b
SHA256352d9f2b65ff2cf938cac8db88eac16bd688bb4dc7f2c7daf4d6a8177c4b043a
SHA512f10213fa10fe032211bdb7833278fc0f375d4d538fdb55fe7754ad3b895e0a000a57e8ab398ef43e95595b7d03b83130837a9031e8b3e281787468455f167e6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516de4c9fbfc4eb6edd699c5375a2c7a2
SHA1efdfd4bcc8025cdbf788b7adb36b926bb5a6471b
SHA25639a08c457d7a5e49b869f40c3f8b33f8509ec663efff887b37d0a93a8a407d15
SHA51274fc320849ddb5d5821b0abc72fe6655f64cbefd4f2005336999bb8e78d2a509becbcb4308890e3bf35bbb4f751329fefcfdd2ec3b34e501d25b9df39c074900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9c19531d4967c6eb7fd899b7aee52b8
SHA169bb38463b38317ce34b5cdabd2a62b986f32c3f
SHA2561d686cdd87f7a80d2aaa6c5d622704479e2b4b15e24c23177616e7643ac014fb
SHA512264891fb7cf5bc15a8d97f9083baaf164b96c64b368299ec10a8b5b2dfed21943b40b921c28a6b3b238cbac8482e47af62ed76f5272e520b8d315e9bfaf0b358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbd0e05d8ce18a5c0a8592cb2d2f76e9
SHA15b6d7f06ec821fb05b805eb412861c9f1d7fbc2b
SHA25660cdb5f2570991cf375673e118ee69d7b26d7b6839f49a0c372e146abac463b7
SHA512126082c8f6cd00a7fa1493c33ff40430fd1a4fea9af33b281dd5f3f75015e7d25d2acfe6a7e00f53149d70a9426771ec4976bb786bd376222196b41793aa59ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b67ba9b417648bc66423dd2bfeea2e0d
SHA1f0559aca10e6dfec7b902cfd392cfd26760b544a
SHA256803526b1696069913476a2f813dea0bc7f5a87994ae1f78faac8e27e5d12f03e
SHA512af14e0ac5c93464d42e808dad58b2de9636f999d374a7c853f55f4a1709917ec7889fb1fe41013ba9a70fed3d17ec9ed413d802af4069beae5a74d8b802f776c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c78aa4b6118dfbeea37097b9b6e1ade3
SHA1ea7c02b8b2c4ff5fd17216f6c8dd37e625891fb0
SHA25694ff1cb53f9dacd24465571e6736f5f80a31714ba16b7c0154f585179328cb78
SHA512c21c31acd2e434d1b4532100e3db7d80661df317eed6dfe6b962f96a6122cc6998e65197913c5a7a071437e0511a78239ff2fba0ae7f688f24d83a9e8a85e17c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8e4ceaeefd9f6f8561c35643ad5969a
SHA105fba00d5e829d7389b5936ebe6b8eb6f88ef018
SHA2561898aa501d50138c2769f8ee6ad56dc0a95b6ad525bb6abf5874d5ed037b5240
SHA5123089093d7238898d6904c2e180a715bfbe17c0a9b99d5a64f3f3d1e9761713820fb7b84dc1b073b55c736f4f862302241d4f3d4142b66d91827386bd25f3aa77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51249e041733f4ad4773ac57555ca7cfb
SHA19f9ba8946b49a57c17b1f0348384728dd44507f9
SHA256395c7db21face61c096f5cd4a661dbbfa30295fa59cb71b7edf78cdf8090df2b
SHA51238ab1a84e218dd05c81d613ca22aae64ad0b1388ceeddaff37549c64d2d3e1b358e617c55d98b1c73ef67150aba9111abaa292c6db744641b81f8a4fb6960049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdff5a49ec16e4fd2c920d6d0a6764f2
SHA14d17263c7c84ca9e9894f0a200b123514a028bc9
SHA25652f1ce5a281a6a79c82661150e21f661cdbc17f1f8e6517e57d4adf8c970c83e
SHA51247a0dfac3940a236d072973ce3bc2e8d8fa38b06313ec2dd72337ab854337ab2ca580456d42e40c2dae39c25090062f6d18164f44ca50b1ad21d059520e2ba3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51035230014d8c328627d3aeda56cc4ad
SHA15085f5f6c045bc397a0e37e36993b49fc19534c5
SHA25684dff55b0dc9b591375ae47bbbcddb3210fdc5fb6e106cff834394ad8e1e4731
SHA512a19bd833fc10fbac7246e21f7969f9383176e4d90ecd9e897933764e7f757afd8be351de056e7f5e6e554c69a160cd0df677698bda7493a3fc2df7a1fa27acbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e152e7f647237df13eb8d9796e3ecff7
SHA198f527e058eae8178da5f74bffcdd0ed7c4f91f3
SHA256c073fa2d02a3bbb8c5b381373824e8815f4636bbf7285f3ec9355e67449e05a2
SHA5125e710121f303669af1358eaed92befed1235ddfe6dd4ce36ed1c533090cab2e0251407b309ea17a791d8f5d4cc3ade5a18182f7fa771ae6b3d199edd71780df0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JQ7VMQEC\VW1UC1W6.htm
Filesize166B
MD53ea1c8d079b38532a6e01a96216ba5e2
SHA1598d3ff91d3e252f1e13df8cf0348b270ff2da3f
SHA25687a9323ac85ce28867d5d7ce590c8f29b8d1a999961fca71bb33adef48683691
SHA512cb4f800a735d5ec435844ac114a81ee6c4a429138119b97f2266edb87cf729f1a64662190d04917ce955b0bd3681610d49be42cd6782989ecd4b0d87ddf8a03a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b