Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 03:58
Static task
static1
Behavioral task
behavioral1
Sample
accf4b882c185f62d072afde867b31f6_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
accf4b882c185f62d072afde867b31f6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
accf4b882c185f62d072afde867b31f6_JaffaCakes118.html
-
Size
4KB
-
MD5
accf4b882c185f62d072afde867b31f6
-
SHA1
33f8390c7c2478d65d1ce4938652791e9e4d3f1b
-
SHA256
fa05b76f31eed4ce89544285948c91898a21d15caaa465dab53055a733eb76d6
-
SHA512
adf6a4130bb572319ba44c844367bfe6df39602584df290a63ec263e26d3fab618e4723f91660505c257022ce229cce10478aa37c3b18e51ad92d47f6c7cf0fd
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oYsn/g8j:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e084132423a5694fa79fba4cbd2b0ec200000000020000000000106600000001000020000000728d1394c9425cb63692d79ba9aae91adef6b8d916eebadee438b6d449276735000000000e8000000002000020000000c4b8f4b1f9f5e3451c57ff685de4bb3aac51fc8accbe74da96a2831558553a82900000008544270daf10caa106d55a8257c5b8d7a1f6b9b4f02d5e3bdb164150fa7e70f773128b70751c1925224c84e44256272a6c371542de895482f832d6e1eae88057fa0d28d17ff06429c6122ddb40314063132025a61412ae4c62a8e596cad15a579cec1220d2408c03dffec73675baf9c548d3bf41d25ff999860c0005451f897a3bc2052c48b8bccef0e545f853b90d5540000000138688d531c879fecc0713718fc4342619918d199db96dcf8fed2a92cfb58f8f37b223fe89dd92540889e7e8b77e548ac000e08bbdb5e814e8e03275ae6938ea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{83707641-2ACB-11EF-AD30-660F20EB2E2E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30a5e157d8beda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e084132423a5694fa79fba4cbd2b0ec200000000020000000000106600000001000020000000e4ba9106091318b46baa77ceae55020e0352db850ccb06f6a0de3d51ff1cd24b000000000e80000000020000200000001620dadc77af10dc12731016ba76b9b0c4fd0930a2e6aec932f7a05620d436a9200000004d1f31afb047e3891f5977347214b3be0dea53a1bb703009a0d21944a5381b4d400000007bb26581eda57aaa6a9791baf52ce4ee431fd273f5a2e409ed7030c7d75266be04f6fdd390a099b235154f63418651b52c0f92796489c918d3d06c223ef70c00 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424585772" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2696 2072 iexplore.exe 28 PID 2072 wrote to memory of 2696 2072 iexplore.exe 28 PID 2072 wrote to memory of 2696 2072 iexplore.exe 28 PID 2072 wrote to memory of 2696 2072 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\accf4b882c185f62d072afde867b31f6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dac6cd6888e822c02c7424b33bbf2db
SHA1fa35090d9cb38ee776b72a998b0eb5b8ed258c27
SHA2563fba95e974d70076e2e7f463fd25a292943a80636dd23fe4af88c3d3134ff6c5
SHA5126d259e99a6246eacfd8e765359ba6fb176053603d0d7e6212397af6cfb4d91d87c6f03558ff228841dc427b4c5f150de5ddc2ac7d8fc61bd47150e8160db277d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5384f834beecc4e7b00e802f1cfb102fc
SHA1e4098a0ca22b7cac695fedb073d1611f83e9c732
SHA25642beef6fad089b845c3feded32400f7b3ed79b2bfac6a996285317067ec02b37
SHA512c96337017f1ff30ceda191710c82be5ac3f75dfc54c6a97bb0dbf07632d4177add228f228c26fbcfeb420799611b8cecbd79f85628b84220ccc20d8654c6e11d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd00f793bd12f87f0492705e2f2e97cb
SHA1c40c8c7e2cfe09abbf0b879fb7e0401086f687d5
SHA256a930797bd9ea7bdecc20ffbb33f2da268fc41404db9e8b9fc5ba31da48b3662c
SHA51211187a22caf5c02ade60080ae4622e2a0661d62fccc4ea364baa7e6a93a670e422ebf92c941d67d6d8ba81f61c656e28497b3c605553e3f7d8454c75126ec08e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580d54cbecce458659729b3ea0ae845ee
SHA155c5f6e38a91f92ac12534fd7446f14214690d4c
SHA256de2f93320e82a5f954cb0190205f010161edd1b4b87d5d72276b8656a62c1af7
SHA512f0a6e49c23dca2cba8590123dcfba31f25fa28bac93da057a60e78ac2777e771c679bd9aa58578ed2f6c91fae7a7077bdcbc17d1f382d892938276f47f290c78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ed33cbc0f6dabdb139638271f95107c
SHA12bad9b0f732517ce487afa8087e823d25627d78c
SHA2560c435b8e2f50d4eb089d27b4984d077fe1322daa0eda29ad6efdf97ff2cc1e34
SHA5126dbd098782997ef9bf0abd87bdfbbb834f86ab90ae798623d912f1e5cb05bc5a2e1dc4fee3dbfd4368e7d1e039c5c4c1515d96b57cc55b8f6c1c02d58e5b19aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2a9d76a3a500192edcc21ab5899b656
SHA1625f69bb27d843527de2b2940ce819416040538c
SHA256f30a619419e528b5534980d73563c1875407a669094e6f76a56080fa2c6f57bf
SHA51248891dd659df03cb5d24a834f4db5887d8ed89e0f7905a300fd981481137af4d45721bfd95000a24441d7007cb75902cc58e2af5c6648c9debe1ddcfab934f15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577c535fcee7d1dd23b8a44c5f92c2436
SHA1b5c387c4c05c25fc25502b48541493c5bedb0025
SHA256a58e5cc38cd1f637bd708b6bf9df11c1094017cd673d90aca34bc3f31220057d
SHA512e427da244cb9aed2c74a02a100a414d1a6d30706d5757a1557e87a4c75a7201b5666680c27ce0ceaf5a926916a95ed0777eb31e2f5becdc3a7ce485cef128ea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515d07019b457026a6b1a3c93c0c4dc18
SHA13afa31074e8d29b261126e5efb0b300ef6100ab4
SHA256d3639ed7d8078f62c8e0d3eeff0f52dd2e6d25c989a289a859de05082fca271b
SHA5128aac1b93ac639cc3373f35aa1fc9614bdde98b44dd9941858b97312f8cc472ee5e11daab1bab484de20feb25c2e0c24320867971da3f6cd6bf18fab621b05a35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c65f2e5ea9b13950d6ef5de62d0ea55
SHA1c789e8c714215d817fc0fd81b3008ddc3b52034b
SHA256739660031f16e1c368d3031682d0e2804314179605fb3c512729a32829fdcd1d
SHA512b56f4a9e5e4050093cd65ffe30647d373fbad6c564c10c3f82f2c34cb1a9cbd6cf554dfc74e1462cbccbafa7c63707805403fde1f3b3cb365eb9b21b152f2585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef28c1ecbe4f408e894a6044c9ac40f6
SHA170f42e63001a60a27f2c976f7ff16e8986cbb99e
SHA25640126b4950805aa13f2c278f67aa004e4b3ce89cea951006c07c12748397af54
SHA51270e4b7622792585a3b99f72e03f230d3f184f0d6b421b8fc360504bae36704343f265f8d8c35dc7af6143ccf17eaebf7d3b46431d09b67d986152a8782332e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d6dfc43f2adc1c0e0c40da78fe43c5a
SHA181f01741bae2ced937164110c0d97a87d35c730c
SHA2565c134a97cf3d0237849e393239aff8b504d14bd19ab9ba75cf9032053abd359c
SHA5123dcb2c5f4c97462c4b2b48c21f26dbb40ccf42b8faefbffbdae63fffb3f171a09e60f84c0238a2c1a8890dbb0613f0c35cb698482be34dc535a2d7d3a53e7c4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5013b3cfd433b29ee5009211866b80b
SHA1ee3d47cb539391f4502d445ef102c6c36506cc80
SHA25669a00c1db8c7f382085af34d89e9a50a56ef6450340b8abe9e13d4bf58f0e30f
SHA5124c5a258d744a2d2febdf423e749c3a5b11965d0f6d5a99fce3da12a8fa65ee90894a7db8063175fa59840f8173abbab19bdf551b3c4cac18aa26192f8bc4b237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509cb21cd478f5853074bd292a1d56a3e
SHA1314fd5b9145f59ec0635842d06956234803b8d4e
SHA25677a9c80df2accf95862fdef71d5df417a9e254b64a146c493703e3d39373f7f5
SHA512b53108c71c0ee58c7f3d512acd2b591cf80f0ff200477bf076db86800f4223dcd631a2aebec3fcef2207548d48e4c7eb67dd1216a3746800f10bcd690dbf9574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae1a82a3ed9ae3872a1ab24b246d9300
SHA141b6aefbe36b763b207bf1fa41de383a672c0f25
SHA256f5906105433e556f28783e85e5c263a55e268772f15d08b3192caa128488c6a6
SHA512fbc679f43afd03a5aead8dfe379b612d7ac595d0eb82b8253474199321abf207c4fba8f358b01dc7f3f4dc00b7d9f04940d40ee8c52c9d6874c56971848f0892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b7af93d224ec8256f1705f9e57e87b3
SHA10656b53283acf4f83faa2dfc4729c6cb0b146528
SHA25600510746f9adaa9952ca66e62c8c6b5bb0ea128d5506e29b2f46d714ae03c16c
SHA512aebba0b4c4d3f0cd2ef1aefd1db9f43f2acbd2e8973c860ac607fba74f98dfd9d15a0cdc517df3c5f48d991774c4d0f2c3e2752bca681b0615315c6411c72a61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e3e8f1bf1d2a6232cb02b1c4c48c9f0
SHA1925ec335d5b86e78223facd9323117a9477ad5a2
SHA256da0047c0dff3d47731325f36eb995e5d586b1f48c3e7c1cfd9c05175c572a900
SHA512f57e5a26e23292361a785a00e0f1e99825e48b4c0a05744f9383f51af2328ff84fe351398a9316b3316b4e29fae17cbce2862db4edd481eb144c44085d2ed671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582d4ac76511f04424714da3d13f3fe12
SHA1c14adf5372f916c50820b37ea3331e81428c3ece
SHA25699e68c385c848c41270dfe1f7ddd31a3953180ca46f44264512c3121c3ed461d
SHA5123333352a67403a6dc956568fb051267c91fd27cac6ce305d235ee33cde9ad5367b24d116cab7c56d7e54235198c2da304b6f26b8892378394f1c56c49247fb87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532a91e63f3448b77de89086ea3b8e0a6
SHA1ccbcb22b9ed730ad56a71c69c5be430e6329fcbb
SHA256649d09b332d59338e5ab33f767d813576c956302b48e099219bfc40e6855cb6e
SHA5120620d71abd7fa4fa0dde34bc40fbbc09c4cc37710927fa268c24599abce2153f435928b68d5215f0c40a0b207fb3431ba39a72c0ae4e8244ab98b85db141b648
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec530a2361b5d228201c8e59a270e2e7
SHA1f446d43209b7318554ed801c605d9a6b8c6783c4
SHA256d20dd8146a01474a324319c028269ce37af112e25afaad8711a7d9b7ac949e33
SHA512b3b32f983a1a563e31ccb3fa66c486378ea25b9673b8210658d2d951d89a7518b82914ad22052fefd691d165fac506f6126fc15c221fe1bb091ba11aac4a0d68
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b