Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
43bb882eb288888bead7170b9c939224_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
43bb882eb288888bead7170b9c939224_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
43bb882eb288888bead7170b9c939224_JaffaCakes118.html
-
Size
19KB
-
MD5
43bb882eb288888bead7170b9c939224
-
SHA1
e55d1ec081e0fff76ef2166eb1b69bbc65e5ed95
-
SHA256
b7b1049ca2821222a889581602147c9db0cc2dcef309a5ad71620ca12ab7a73c
-
SHA512
949547786c8fcfa95029656419b1898b11f0714c6a8130a1b498718aa0a2c5ca2589d859b9f8be32a041ad06f3962076dcaa2918522d8263c0e4355baa577d5e
-
SSDEEP
384:Fd4BCtDX+yeucf/vIWs9eFFK7n/3dykpkx0ixibQb7TfMwDH1HFE:YBCtwzf/vrKb/wkeicfMo1Hq
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427076053" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A71D7451-4171-11EF-A0C5-EA829B7A1C2A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000889d246812f2d0614daa8aae053c6e7e3c1d9965199c12700ecac7bd89ef6433000000000e80000000020000200000009fa232e2c16424a4ccfb7910ac1f76b6e12bfb1d5a8739e6b00cae9794c564c62000000020a2540a6b31330b3958ce72aab9b49a95de26c18b75bc0fe231f71f4f6f43864000000006f47089cce6888ab71eb54e736edce2d3e37b5ba97e3d045c68f278d980fc4271a98ad491b6e693558ed99397c93dccc6ea76ea6d5c292f8fdf4e438e0f0cd4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5060db7f7ed5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000008267de6ab2fb795a14fa7b0bfbfc0c9d49fd83547604321d0386101758bc9f90000000000e8000000002000020000000162ca7d4032a50568caeadf668b5895426c8fac9b1cb9d3a129ddf8492b76d6b9000000039c26d90fd46512c5ba5b672a3174ff8d2a02441f1015c536809579522a7afcddfa014b2cd954d20c39e41f01184d52e79fabf75eb57e259c307459c34beec43e523bf6222c387d7c9a1bb512a66325f38ab4baf58d4c04db6b73fa72eb91157b5667cb685f2dff630840e2be10b31c7972eeb11e7c24715cef915deae1abc6c1f5058c722213fdd695224c971ba728d40000000b51f251d2abac63d318d812ef4c9e82f072060e7d9106f48f3cc89c615c3311c7d9f83e768abeff9b6af53d6a53fb35e3971620d7a94f5a1835e7b8a47ddb2d4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2552 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2552 iexplore.exe 2552 iexplore.exe 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2404 2552 iexplore.exe 30 PID 2552 wrote to memory of 2404 2552 iexplore.exe 30 PID 2552 wrote to memory of 2404 2552 iexplore.exe 30 PID 2552 wrote to memory of 2404 2552 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43bb882eb288888bead7170b9c939224_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d111898567b1ebe34c76cafafece35da
SHA148a85fd0fe6d6fa177aaa91adeae8e5b25c46e3f
SHA2561976ebcbe081d484110f785b0a57b73d5046ab5c0a6e7fc2f7be76977e173082
SHA512fc586f60052b872bea9de968ed624cf48e297b3d3e874d93a3f79993f43b0548080969946f5816e8fed8d343079da67214f1dfa3ef748076a47ab0617a154d4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f9c4e26adaf65f0476c21831a12fe74
SHA163f98c44924fbdba37f0796240871a3c5b3a5a3e
SHA2563886cf8d7079432d6b5c4e73fb644c304816268b5e0c53b5da7e7dcada7f0aba
SHA5126a63820169ca0ec0842f986d36fde7c1c73a817ff72d42eda85cae06902df8e971e9904ab8f524a15da566416e28cb5bab6b45c28334623cca88a39b33736221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0d10bd49496b36b717b717d2f2e7338
SHA158afff33199577df8b01679ba94388b046383574
SHA2564dca13c5cadfbff0f3e62928d51f13561e2d8076c6e761906762791438e6a205
SHA512a33a944ee342af93f265393f2e9aa1a6e5c49cedc0e888c1d25180c8c55903e3ba4e9ec0eafbe1cc92e4770643e22919af19545bba3f832a3065b53d071132a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55691bef592431a0fd1b213297de9b308
SHA132595435e39572e12d5b8299bdbc4cf169c3f7c6
SHA256924470880115d5d0872f64b5d078675010eb3ae0c5c4e0f6aca152a657622850
SHA512255916861a1817e25336627f45b55c9e898b6350b2e135efe0d4e200a383c7b9ee2574eef8eb478c956ecc7912bc8eb097cd43284d4cea2461fd2375b9a0bb8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d4fb9e6299c15bac26d8022263221f6
SHA1484cd84c171ac8b231c7b6ea38cf009f21399624
SHA256cebce890ea73d7d8808826f768366ed9b2e5a3106832d5e385a10acb9db339d2
SHA51221499b735efd7207bc89d9b3245764a8e64fc6f4091bd9dd7b957b223d4e4056c6dd8c774f7dd955d26f50fc958c5d2695572ddec7dab6c2364690bd6bf31389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561258b687e70fdae07518efbe82eaed9
SHA1602a41295705e8cd66184b42f13c15696c3de066
SHA256070ef65b4b5e70608e8a5acdefa4edae8ee585afbe540b8403239ce9a25bf13d
SHA512fad707b876681ef1abe3e6379b8b084553370c958c825b94dd77a6eb0e9da15046158b39f0dc9966c0462b60f49ece540c3083d90dac68179e9ce2d334b1bcf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cf58480f10ec744ae323712c3ec0eed
SHA1601884997a57912772dc862a7b0d8c36a35a09fd
SHA256d434c063075e3c13344b62b0cbcc73e79112ce43948cbceadaefd9ae9c5e8eed
SHA5127da793f0e3b9532eee444f843470f0957c108dde3ef116262d1137e8cb81515512756e1292e77b53031eacc085802fe8cda1fefacf027c77c405f0de917bc107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55da0e1e0aa7ba5801e654ab450f664f2
SHA12cb7557e898a094412cb140324aa22a98bf64855
SHA2566cb280ce0302d87e855548f438cdb9a96ce09105d348f1e11ee49a8990a3d983
SHA512af48a5494133259262fa57d87c28b4a948e1c98d5db53d1a52adcfb72e05d75942e30becb665354a158b1b2687c959d162d3d7f4994dd13180244342cbf78e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a1186a15d8612b53aca401504d5e0ce
SHA1f4ffe1ff168cecaf5bd388c12493f6cd389ece9f
SHA2568c98330fe1335ae151a38523f1a2728d339379195208fc71f8ab9e073b585293
SHA5126ea1d696a62af3b895ad73e666d353b7b7a6375e731fc729d12d41a85790527f27eea820f63f0ef9f35c64e5b3eea13473f69d2191d102cb5367e15463b4bcfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562cb3cc7123e32b84e9b3f402e246ee6
SHA18157ca3695c3848e348e50578adc643eac5631cc
SHA2569631edc15b72369ec001a63ecd010c0c0071f02f464de77436bd7b297059b4da
SHA5129b72d885cfdf00de20af846d0e4e95608fbb0d49ee6e3db133e2b014eeae2f409eb2a41304bba4ca521839b9d9edb7a11f3f92d0bbca0952843bf342136a6f44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e17ffa967289a546f5a977dec5ea180d
SHA13c9b7efbc794d534a63b0b50c2e0f3cf64f3f5a5
SHA256957055ae947880ef83d9375131578f7fa6804b5468acd7179fb9f1cec744ef96
SHA512747970b802a6da46cda529e9ae0437c1324f61e5da65e63a715133d16fe5024dfa7a4ba2b65a1b366aef3196399a4278a9da5545a79c1c663b0fa3c0006ab623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500f6552ffec3a9260185d5200b48f4c8
SHA184371fab77c0f8a58fa9d9b0c1a1d757e3ea827f
SHA25690e9bfcdc420d7517a777555b61be4dd741f344c9e06e47097864aacb3016910
SHA512ae069fed74d9486bc4d3093af69a654c66d00d89d0f25cf858fa43a30aa56da7e4dba77df85215f5719363b51c4a2a84eb164d148fd528fef0e2091a7c739006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca728c0b5f3357bc6718313f98939d43
SHA12e513ddf18133b4609a2fba3ff96a8e67379212b
SHA2561fe9a76b8e3e16e8640cb3a4cfbf4b1bca2d32012a60c8b1d9b0517c89c4dae0
SHA5127d3b3ff8fc3dcb778e7024a757b03dc4229909fd6ce3182e021ef26f2fe349c9ed7770bc890d08291c337d05316ff87431db991f659ecf302a20edb909820ac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dd6ae8300939eb04d162c787b1f5c3e
SHA1b76c2bf935c31746363e00b4426e0f52b06c1314
SHA25681f03ffc80105940ac623f85b6695784ee1399ee33bf0cfc3d23d6876c29c9df
SHA512f4bbcad3ba84d2794fbb63193101e03c28f035b85418818d4e43c74b6a9817b80b72df2a8a20c6d5eb67fe9117a9fd51dc89ff783d6df46398b9868681ec2fb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5911af608d2e024cf418b42b7c5bf1eb1
SHA11d3c98283245d61b8af113a3487e3aaa213da762
SHA256842cffaa9990eac8c273d047d1d4ed500cf52ac3422edaca897470ba6625a0fd
SHA5121655aae4649e544acf4c0533ae366d3f8cca46055fb21aa84c54eaa102ed24e7885864391b2b78413b9e6a0c18ae17135bae2e7c26abffc066c55ac62744592d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1f0ce7815513845bf967deb85db75b0
SHA1afed654c3e37d9c2f814635dfc7d5e373bd674ec
SHA2560dbce2e0367856492c4d67b2fd45378d6e6c1aba20cead6adc5251f24597de49
SHA5125fa6d386eadc7d78a03b1dee8b0b80d5bc3646e921ae07dc4b92528eab4e180c7f8af6017be45a90a9406eff1547fd57eaea7d4d8428cccd954b32c7c7a50443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577bebc92dfd6ec6dc8e33a5abf00b2d1
SHA141c9f578892c48c4336ddfd5129cc141e0c38849
SHA2565eb43487f775f25aa69cda9e976b83e799f341014feacc24a12f45fd5e51a421
SHA512a04150e5769a1a4d9d83b95110c1d03e1b89b372e5c465e94bcc7f08f783059d5840ddb7bc477abf9958513e42130d4877e61e8bd23c829f848f1d421c7d6430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5175a1efe77de6601a636bf0feec93390
SHA1ec468677479d54b9806cca3114eded66a68c79c3
SHA256e740d4f87450e1a3f08202725b4ddc784d7bfcd89c27f175c59f1350076209e9
SHA512e797e407f1d25c8bc1586e1e7e19f284f3658e834f6398442e87ef67f6498a8c9a3c1ec925eefc244efaede20c875f6e4e6fc8e386a085d2f0954e7e1a010c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2ab983bb04538c06a90f06c630ab77e
SHA1869201e0126c0f360454cb72768bc5cbc092c066
SHA256880e4d93b508ea2d46b5618a8b22778f78468c9cb9cd5a01ab7f76e6fe92f77f
SHA51276f0dcb9afc5e4b051a4162d5aab8c55dd24b26e37935e0ccf5985fbea05487eb04b99731563e659e13b0008c524e6cc377fc33b611e16a4028f4729ff57afd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fd509f41cfc852c3879622b0106182d
SHA11166a4b4b4374591692afb0a2040f2ad74056efa
SHA2566e640754f4225ecc22c22059ce3cff35821dc66c3c62b5ca2b59db206dd8bbd6
SHA51239c050c56b4476ea29fb746b93a12d15752ba07b99baf7b9fd5fbacdebaf19daf23890f4d45575f4cabee0a7e0d79750c571add7a3d149d633cb7bb7712cfc51
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b