Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 22:36
Static task
static1
Behavioral task
behavioral1
Sample
abcb93a762a673e103809df28acf72bc_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
abcb93a762a673e103809df28acf72bc_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
abcb93a762a673e103809df28acf72bc_JaffaCakes118.html
-
Size
94KB
-
MD5
abcb93a762a673e103809df28acf72bc
-
SHA1
15ec798484b2754bda61dd7cf5299fc651fce537
-
SHA256
6813dfaa309d51139a3dd297638623b13713daa58e685c6ddd7c5f586f55d390
-
SHA512
8dfedeeb52cca1a533ba78fe02da0f2e5b879d28842ee1f6d0e5bacd6aaf469b7363feabfc796414075a14dd90e35100e00b58414a30be9134948d2035a3bdd1
-
SSDEEP
1536:WMLiNV+j1cfLhKMXFLeK4qEF7L2jnUfcbyRhZttBdkrY8mgHC+qpEyW:WAiPtABdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a03905000000000200000000001066000000010000200000009fca0edf4ff1028707e2010f3436d3a9139a701efb998e7380babea5a7bf1bd7000000000e80000000020000200000003765f627c6742bd15dfd020ac1fe5f5752cec466d00787c16e482e9178160baf2000000043e094ee781c0a2460598fcee8558adc234b6ee6e57550cf64b485621f76ed5f400000000b040f772eeb2ea8e54f7335334a6f158a68d1b12ce27fcdc9fd29d73ba84e3c5205d9ade96fb86b02d49197415d831dcd9ab4e0dfcd790e0bd0cad88a939d79 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40110f6dabbeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{96AE2041-2A9E-11EF-9028-46C1B5BE3FA8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424566477" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2304 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2304 iexplore.exe 2304 iexplore.exe 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2132 2304 iexplore.exe 28 PID 2304 wrote to memory of 2132 2304 iexplore.exe 28 PID 2304 wrote to memory of 2132 2304 iexplore.exe 28 PID 2304 wrote to memory of 2132 2304 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\abcb93a762a673e103809df28acf72bc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2304 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e43716c153f08e16f2aa6b24c7df84f
SHA1dcfe373d05336e5896d2bcc9833ef93db15a58e8
SHA256f5f4039b9915df07a872c3660ae47c92328b5a5183f4dee052c8d1583ab95982
SHA512cd7c75b23ed782612324a816287bde9eb37e334b415863020d5a83a04a1d2e267bcc296d43d5e4c5490cfee815c9af3e2a2ee1a9f61f2e20d380185633ba9a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0786ca6838fb44dd4f0dd6498fb5de3
SHA1af40cec90c16d9080c8183415b78f96ff1a1b6a6
SHA2566840ace695fc2d5f206c5018d48068934602913aa0155b84a9eeea99d68286fc
SHA512ede43d6b09063a45b521289f3f801cb66fccbc49eb1943cb0dceac9064cce7f535b630fe48a3399cd72c71d09eeb1ced7676271573bab7468c4e39002f82681d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509c197855c08ab71cfe07a66aacb5dad
SHA17cdfafcfaea121195dbd3efdbc40e73a3469d133
SHA2566e59973eef860a0778acde7a20fbe4fdfa0642d6962e62fa18bfaf71cc82f5ac
SHA51229c15462b05287411b1ed273f9ac335c7ddff8ea28606a5a66548f1fca9b6007838e1d8e4c712443f5d77dd8e1f1f5ac1fd91dc43e9eaaaba5438cfa29ab2227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542e67bee0ced077eb4179656be4406a7
SHA182bb562c15fb3a51777a14e7cb0b9ce595d53a85
SHA256d98e24cb8e8ac8f9102b3f053d93827b5f824762c941683feb027e3cb3eddec9
SHA512c3ce8e304caa2603a33aa0ed88aa068dd1101727df8493e928d86627ba341a9116c4604cb57a09abaa734a7b4214147bed4e4d8f86b10e0e3acdc015bc0aec97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5471aff8b35f050dd252d3de6a67d2cf4
SHA13b7375a0862ddf8052fef3d2fa7880f1a00862d0
SHA2564c428a283517540bbbb9f0c817657d0467a44f22749d96923666d782a5a93fb9
SHA512202426f698c56519682a91714ce81a89b26c1cbcf3b15d3b6e576a73b08505e3873aa4aef20e1d2d9fc3725dd45cee8050ebd64588fb2e33dd3d859eea7ccd0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffb2b1f2d5cf6f011ceb9a7a5b6f4952
SHA1678778fd4a95f98674d20db2d9d8da8809cbc547
SHA25621c9b6096a4d09763d20b7fb0ba36fcd478eb3b34b6c63a7064e6cde0b89fae8
SHA512e9e4c38d44a0cb867f5138bc41072a1ec62a5729515f8db2b0c3bfe7da7d9878aa6031b533c3e8f4ea48a355df8cc1aa67e7fd2f16d0205b29a2a5e2830c8d78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f37806f159c44532d03325e45d41aac6
SHA14345bd2ac96b5b311f7df59ae607cb8ea560352d
SHA256856086fe41d80958d708bd63c31a98f0da61c8ae07d354de3026899c5a6c72d5
SHA512fb7942d9c7257233f10eef1772b4650f87a20b37ded9769e82c96a52f47d1fdf0711ef49f7ad7e28e737a9e7314fb4a6d4658e0b665f78482be6bf092c4e06a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5227d0c0e4d2bbf769d7cb78fc4082ebf
SHA1a136db9b64e62d2091c58b1ca807bee05ff38317
SHA256533d26ef5909b70e639e1e2f830d156db3053edc3b92adf193b65cfc0c231e6f
SHA512ed9764841f721f98e29fc4535ef00c95c2a74615998317e843d9b65ca367f59abb5f8abc3e485ea0d168e447d7b819ef49e90c700bc24868d87b4e3871ccfb2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c014cdf70a1c8292d7938a17dffd14f5
SHA1bc91fea8d736ecc70928df1331b6e4b3d7bbc0e3
SHA25673470e4308488cd83e73aa969730bcbe2eb161671d4a01bd32321d2802d0f09c
SHA512f24e9423748d14540e74f1394b3cedc994ed3c20b643912c203a1a971fe878135cfa7ee929738226378be96e8d388f331c75064baa6efc4a0f4a5ba9fe0aca6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a5330e14f5a49904f2be84284035171
SHA1ea96eb350f03393e7764bf3115a870f60518935b
SHA2564fca9878dfba706be9dd9b242eaeee3478991e3817dea8d66aeb017ad706da85
SHA512418b2a480fbd435737a617a4253809f4d5dcaac424b61716efc37878fe479c4be6e6349a6913952c3a0169226d8ee297d01cea85eece5ddb3269749f8235d77e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9c9fff16dc3d6d9d407c39f088bdc29
SHA10862d1786af9bee94487f882dd3b9efd8e63cfbd
SHA256e9cab777001ac81405260e54cc6adde1e067998d15ca683423a56c028aa3f504
SHA51262867cd93e82c283f3e3f16a86335436f26f82e1f151b764a63290d4f9682b167b437726690fffe24bc845488767d37d5729ba7be67d0bc52071a1c7ab6a4148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6eca9b2c7a45938a3e669c92ee2d6bf
SHA1a95aaa74b8db07baf61987ff774a29e4e29e862b
SHA25692fad16300c463e1708b0507b5e73a23dbeee8392c076f079f1dc50622f66fc4
SHA5120abb6d8373ad5d6d516cee672d1d2a7720478a285b9d73abfa3f5cd31ab298d77eb9afd5cbd0e771f4be28004f94bb5f3e0b3f712aa97bf00c4d23086bb1611e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537dea87c7d9d6a745d187a4cb37a000a
SHA1e55fc5c1e691d7e3fb13b1e1db5269e91ebab18b
SHA25690113be0b8149e7578521e70740f6c9a492164a58a108c43ea5b66330c7a5d5b
SHA51269d6324ac766fabc3ae394bc6cf9d676eee9e5f961b07e71022b1fdc6f079da48d8083549edbe39b17ee676c69b2d9c7881d4187be18e433a3de9a18b59df96d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad30805b4c5c6bf8d37763c3bbf4fcce
SHA1aa7e7d4d346b36ce82f3f83860cbd7c28773c79e
SHA256799a711cc5050d5b0538642424f1ad2a5767a460306d1893136df79edd485c0b
SHA512aa693b79c7fc73e4c38ef376badaf13947d0ed208354a61c0718741a39e7db45a333fce8703069c17d0119c31622eb294cf2074eef9facb956899d39eb66c45d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3a675f084f62bd539a32aa66b54567d
SHA1c391dace1ccfadff3e33aa260129e25a17d3164b
SHA256b1acf54eaa951f1c9d4c87621e1505c5a9a851cf09a56c98ee929c77803283ec
SHA512bf14b66e29f5b7114aa0b8bc3dca5c2d8fd64300cc246e9dcd45edc535056fabc2bbfbaa8e7306e7af3a170ec5a69ac14a991c0dadf9e1cb1c01c29bc169b835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59147e0fcc48a6d273dc5b5b45e1f96e6
SHA1328a78aeff76b81cd8bfec0e919e6916c988d04f
SHA2562bc82f21280bd157ad32b01a12c8973d30df7eeb0afd9811f82fef8460e4c491
SHA512f7e2a7ac63f7718c2eb8d25dc8fd0993e0d30714e114daf7229c9b0c0d45851214d52a3c6bef8ecf60d918190e348207edee4f0c8621b7afc8fed75d4cd188d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54611fc889b6a6f24bd8db03aa0b50bec
SHA18110a83d1e150eccb20548a850a58b4fb448318d
SHA256ce9595a8c38f93a41adf4eb2b456eb3059a46dd7c22564d5ac7f36517e66ce5e
SHA512bdbd39a41b5f23a3f7d0ba686cf05355016bbb52061c761f21783a913dc69e86eb315da306c11e4559bb12b7b0e5f9b6bacbdae7672e8c8bc9f8e20d75964757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b76baa0970553ac95dc40a57d8b4bea6
SHA144ee90b32698034d4eab1fd5d34e66692912fd13
SHA25647624bfec490d7ab00ba85513dd57ea7265d242f53fe9a835a60a24e3b158331
SHA5126ccd0558b4a72d2f01d736273f570c57cbd6b0713945fd850a7f3c7647385692607aea123fdf69d9c021847abeb4f500ac233e53793eeba8f3de24491b3879d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542fb18f15e28bf2764e82e6472d4de27
SHA13badf91cff847df6143a4260c9e9e3322455fa8b
SHA256061bae6ed2fecb524d1d6bbf65dc3a321524d20aa448bf726bf55ea562e7d1c9
SHA5125a81035003d3dcdf510700aa610d969deecbd2edbd602dc761341c81c5b93f4dd33abce148dd5763f8a5468e7c5a3fb80d74b0184a2878d6705d0c5ca1aab19b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d06d640025894e7b71c1c552147977fe
SHA1875ef1ad126da4ceb180319822a31f1b043fc19e
SHA256142c156e9ab85922e7c1471b31bad919b9c02564e7f40deb7429a7317c168604
SHA512f17af35514ad11cf3f0588f24e961fba0c336c263fb471246a4db3831120e863089f6693d11a9db88a19d6d8c2110e1e6e41a2550f1ff1a9708fc04acb060250
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DODQ7AEY\wpml-language-switcher[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b