Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 14:46
Static task
static1
Behavioral task
behavioral1
Sample
8e70de16965c848d63efe4d9afaf6ba5_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8e70de16965c848d63efe4d9afaf6ba5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8e70de16965c848d63efe4d9afaf6ba5_JaffaCakes118.html
-
Size
79KB
-
MD5
8e70de16965c848d63efe4d9afaf6ba5
-
SHA1
0d105f378577ddf3be1c39770fa51c61bce99353
-
SHA256
14a8634ff5fc64483aa600794e11871d23d3c22d9508ac12f67d8c42cc267c7e
-
SHA512
13e326196305e3c486d987f5e48c5ad7ccefd2baa32b13b3c7ae9fa214c6daef4aeab76e7eb5b59469ca750d35dd29103d9ee7835d7056b847ee08bfb90bef58
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sf6ZHFca/yZyMaM3MFVoTyS1wCZkoTyMdtbBnfBgN8/C:J3IS44TTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0461ac7fbb4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2683E71-20EE-11EF-970D-EE42DE2196AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003211563db1c0f64fbb25074f8b3e5f63000000000200000000001066000000010000200000009dcfff70061b7fceaab861d222a348bd6832b33f9b438550d745e9fdaa649170000000000e8000000002000020000000b61bee6e698431fb13a277a412f09493a4ccbf411e47fa4fdabb3a0203637ade900000001ba49bb175ab74f37faf72a9dc44f4591d9d2e2e251650907513048b0139ece3e9cc22b0e3646f93846c6b90377bbfc9ab20d66b6bbd7a27ed106618353b7c6849c3aa43d85d5f6046fb00bd3a7f2c4433fac0d3f2ae30fcc72ee0c9686cf7e2af97189b71a6ffa5be79dedeaad330ae09af12e61c5263937f97b14d28ca8f973c0fb87a6049800ab0dcbbc8e430183f40000000932adb1053b54d395423d814fb657318fa91ccbe7a1e77f45c5f5192757e0689e2e838b76d5bc1edac9ac8cf20f96f639e96c8e4c92955a4159af91061d09639 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423501479" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003211563db1c0f64fbb25074f8b3e5f630000000002000000000010660000000100002000000016e088890858616ee329bd28873c9e9b0d43698db65ad2b9a0007b47bf22c8b2000000000e800000000200002000000055bf35f2229e48f5fe86cc843f2f7370819a34698c18b0c3de7f03a9d3a181d920000000f184ab8226ee5af9413be3dca7231035565397db8fcee2f9e813753bbe2f0d7340000000600dcf39238f1596df09deb54d6d6b2b8c8f8cb4a83cc6f772e63e7bfab060b93b4beffc5b2ba36f0696fbea2fef30f6c6955572d433fcf2a4c79cd1752bd6da iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2004 iexplore.exe 2004 iexplore.exe 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE 1720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1720 2004 iexplore.exe 28 PID 2004 wrote to memory of 1720 2004 iexplore.exe 28 PID 2004 wrote to memory of 1720 2004 iexplore.exe 28 PID 2004 wrote to memory of 1720 2004 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8e70de16965c848d63efe4d9afaf6ba5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dde828fd58fa6f2d75f9628792934dd
SHA1aa8698d90fde9677b198a4b7151232de2f2d5601
SHA256cce40e23b1d8109dae92c466e35169e668c6b201aa631f1f5fc5b9d00b0cb32f
SHA512f72bc9a733603f37f46d2e3a12aafa4f2ea76d92495cc3498e60edc8dc5d751f624cac1d77a7eb110d0b4b52c97819814d73cc15d0cd91aec4efcc808862ddf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed0557e0ddc73da1c721e15a086d0833
SHA145fff9493ee7370592e62d97aa555b89eef52bc1
SHA256875a818a9304941ca7f18aec27dce7fc4ae238d6000c4ca0fb77bb28f8d36ffc
SHA51229a5677413690abe81708934d1fee1e94e61bd990eab9284447b149147c277b86e349f15f35d2638cd228621bdc605e9c4a88e57723b10f28fa5ad6b785124b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d28fc83807e6889acbd5985857aacef
SHA164e946538b0e3e94e65972105dbe000afa404414
SHA25620390d760926e2e4b82f8a895636e786fc7b239377e8609a4e3638abca0210d1
SHA512a3ced23b33c22631c48b1287e14d1c847d6f51164f8b0a8046410098a396b90b8cdc425f23afb200fe55218d0a2b9f21c199c05b65f7e8d95a3638fbc6cbfe0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580a59d3f2e98a3cdf0c105f56ab63f0f
SHA172a6e825aacbe31bc5e2d501c7f40f06abb53258
SHA256a2fadc4676d864cd4ad2ab02d61d9ce60af20bbe1c28c4df288127f3433189ec
SHA5125e46a97775ecaab22f389da8d1a1f87cdaa7fda97c19f30d9a88e7c6b3b274566529421d90ac5b8a4187917ec5879a0ae175cddbeab5d851ae0d7af71f149315
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532e864e9a3463deb99a789a8a00184f2
SHA1738c8f37ee4f86b9642667543dcf3172f4debd0e
SHA256e29c430f6ed942ccc9a56b9a39d4ea68e2e8b9856a2f9fab38027fbaeabc0507
SHA512cb3e51323761e4dd4c78ac5f33be9fcd35cf2fd099866b3253742852e84f2a16c709c39a0363b06af6d12d142cfda36864871c8cf40062e5109fd22d91b11af4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575c58624ba8b07cbcb7e82c849a50c18
SHA1546d4de7c90f99b92850ee897a5b38b2ee21908b
SHA25678099d3013e0f18c1d66aabb09599a535020dfa2e1fd3e924ae3cc3ed725ef1b
SHA51294e881ff811b47e32d636cda80402a64602fe823299c3f156b438b1915cf114c709f8bdd55264ccff39fc9444abb57ff10b7b0b7037bd647e73135dceecf7112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b8d64d66526963900ca4721f79d243a
SHA1d58fed163f93181296023e0e0d04c84fd0721e75
SHA25683e0b4d51417caa0fd5f22163e5cdfd87f83a7f5d6b025834470c012570fbafe
SHA5125f455fa3667a6d010e8d79a25d349012724c27e575d3868cbcb333e96385c73c5792f4d820f01a520a84132e3490be2c0deb6f797cda55f904228e25d34c792a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef86bb35d9a19ca9c7002c29308d7481
SHA13d0811ed7bc7d9f3fb7d7192ddfd2c45a68fd5b4
SHA256481d95c5c10b3d646f68e1995d16c360e6737be8f41f424bbfc1473259417458
SHA5125f6307ba7be7b94414a93b50b8f929f8a0f11a033cee2755ebf8eeb64dbbbbba4f8aa707936194d5877b11ebe1f987675f25adb6302cbf5592eb7b913882221f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5660d0d7155b77d14b796f640298970dd
SHA1c7d27fe7b8e353e7995e3ece5953b676c79be9cc
SHA256468a3c849d483855964f8e46e6d416473c901ab1f5031848f5cd02a86fee2196
SHA512cb093ddd0270c88ad45978956bb07a60dcfb7a84e940962a46cc1a3d0f97ba37b5673297724af16f345ab304ab72202fea74b7af14e8dafc6b0cf30902a9d91c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5970968760b01200e81a745ba9c09528d
SHA104b9a3877564735e88aac3fceebbb3881bb8a88b
SHA2568fde20a9534da7a0f29c6370e38c56b6dabb1356adcbb015a8c098bbc84a5c5a
SHA512fa6ee0f8359d0ee443322dd1474fd78bbf31e92576b3f7d5b5ac9b51e0ee8d7c55b86c2ffa8def7e7cf3986e3a84935543e12b0a22afbc54cef86dc7a7376999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55989bdee2aaaa51eccc70972a7996fe5
SHA161943e7af7844f30cad1132ac65edc409fdd8c14
SHA256a825c48c515e247d949dac057a8f8d6a4b8eb72780cdd717fffa2fb375882223
SHA5122046881b5d2a14b4d65328e5b00b8c2fbf650ae252025882dd7522e360fe5007f9b5f64f6462de565375ee7562009bd1e393cbb52dead6fe3d516dddcd887eee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526aecfe32cc068220e53689ae6e9280b
SHA19cbb0cad3044f2667c75028aa8725890da5b38f7
SHA2567d65afbb5761799db072ff4d7ebdb1c0c4f7895d7832ee4070897f2517117ca2
SHA5128b15da6752ac7dbea86daec1787fb75a7f973acfbec52d1a9a009809a9506dc2db7f78c6daa11438094905586d0558df6de9c4210b8b6fd5791d1611c53b3586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ca2def089c861b9b2daf04d02f1f39c
SHA113ea27a4fff0a3cd73919435c64751163db32f8b
SHA256f121039f1241b5f9a2ec9fb0c98a73324b1978f40eeaa3448a18b5a65873d8ff
SHA5122affd9e07ef58bb52a7c1b7c5afc4c5c4d7fd8437c0677736ac4d8cbcbd905c3f9d4f01fb75b0b19982a44a068c26a227ac5ccb77a84a012847e4d909f8c3c05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaf219b49189269e2e83f926fab00b35
SHA1ba6fe808fa71ecdcfe8ec69ae20839a70f328452
SHA256939c3765e50e2466960127e1a08143219c45d54b412a251af120525d77cba3ee
SHA5121672714854681ab3e8f0632ff203d2e5f71ef37232f52b52f2ae2f1d12934777549a82d1c16d63a2e53ed2a65fad98a5644a854ed222a2351cf756b69de36e98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e6f49a3edab841e53e53b4265150e7d
SHA15f4d9384309632e63565dd94f6120e33ae2783b3
SHA256e3af0003ac104527b2131a7415675fb9eb8b971bc5e16e1ab1f1e0102de7a55f
SHA5120a9475d4abe92f7c7347843ca7ff512dbf987e6c59857e418b32ecf82a33dbcda4d74c1843f8009ffa8735820ed334648262c53f0b20a799dde6dcda3e2b0847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575abbf9a8ebb22d74994fcec3f38b22d
SHA1e0f09814355722ce1ad060e6a8bc92833d29d9bd
SHA25655e099dffca5ebc2dcb8706ce08c0c1fdab1da0c108d2a2e250e06bdf43a95c0
SHA51201de6cb8b8bf97f651cc25038947c39ae7f7805e7958b2694da7a6cc7ad74da28884ba953792d0f4bd79967e9f0471368d987845de64ece951047005b8493551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ec7fe43c118ac2d72b4d472253fad08
SHA165e35a871cb0fcffe618b3295fe5e745670f6d0f
SHA256948a90e9e4eed1d5dfede7d01daa2d09920b5ec250644f52cf4fc55cb873da38
SHA5124959d17165561979642a88a643f0332493ca939a033700dc893735a81f3daadcc7797ab1da2c56c12103d2bbf1c5a9f837192b9fb156f7eb8cbb4993759ab40c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b234468d00a893050e4048cc249c6876
SHA1566ccf3acf4e38592be2cd6adae214b6e65f299a
SHA2568c9e7eb20a3d44cf1e16f31d0fb3a2179174539cba40cc33aa1391e7b77b5893
SHA512564100e67ce49b9303b2db32515f1054cef7a658c21d98369fdafd0f01953d74d4f6837259bb1cce2d15307d261c9b216c242c0473913a71a5b7899b7a1fbbec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb258c519e781820dd77612b6fba78a8
SHA17b8a33bd947e770b193d55444647a79de838270a
SHA2563bcf700f1b056ee640d8db9a24948133e0e3c02247f276cee1383543c0c43424
SHA512e4a540b8f0f626b47ccd15b910709446c1da5b141743ed20240404644e07489f201dd36adea499cf2afeebfb1dead13d3f128b162e89d83b290e6fa915540087
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b