Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 17:05
Static task
static1
Behavioral task
behavioral1
Sample
16cb835600531a7f3bfce869003c42f9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
16cb835600531a7f3bfce869003c42f9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
16cb835600531a7f3bfce869003c42f9_JaffaCakes118.html
-
Size
90KB
-
MD5
16cb835600531a7f3bfce869003c42f9
-
SHA1
9cc340634c0e712062c4d6a5da1bb2eae3fb7592
-
SHA256
43f82b54a57568d25045e7623d2a9137d2435206fab34269131a5ed7cad49f74
-
SHA512
06781e41cea83825068052ff083d8a6b9c7d3b2f00d7a3c6f3cc520ee6800210d65f6099ff847fbe8554e9a9d3c82c969e91bf1747ac9b8efd5688f73061b7e3
-
SSDEEP
1536:gQZBCCOdy0IxChzrhI+p1/yBnwgcOUby/XAKQAMsVQy8jMtxUNH6gUszRRIwv/3X:gk2w0IxAPd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 102f003ab4c8da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f48f634e2fe8ef4f94836a2bc342124e000000000200000000001066000000010000200000003ee80e10c5eaf1e8e25ba7149b984fe84a33c71dab30761b69f13906a8bf51ee000000000e8000000002000020000000a5c011e03fa0095d7ff8043705c84c6b424c8b53cc895cf190f242ca4866e5fa90000000035ee83c17c66dcd9181eb940197a294e04eb87218dd9287bd1b2e079997a49c6b11d902e4431a74b2840f67cc86f9f7e7f9d8c9c372289aa2810c7be2f3e27084f99c76a6cfd9b7617686ac3572b0262f534add7704da6467e0985424b2d2e1e55f9990dac950fe6498fa4d596fa73a0a83dd8136091374aa5dbe402b99454f2d76228ab8339c21300d17e339ab9ea740000000c42d69d5be04111b337a337761b65118c03f663c70a1b09492dafe2ff119d0753a3ecbb597e944f95e95b2605477e35970a2376723ed57822af989592fb7643d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f48f634e2fe8ef4f94836a2bc342124e0000000002000000000010660000000100002000000036f759dd6d5cb633e647e17e4424a1d2434f336e16f4a5cb45279f7c21d5f179000000000e800000000200002000000086fd4c99f52f6d914791139d6f9d679ccfdce4458a120f2e1179c42611b34d2b20000000663941727f1aee22a44a0bfa102b9c077c17da6ddbabc55b74cfe0192cdfd9a1400000007a1b5d7f1194da803d68f4fc52688e9fb14d3cf114eb3934db86729d2e4e5c7cf8d613fc32699616253b112619c371d7c6187364af67a7b5e28230d968f6147a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425669770" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{648FA8F1-34A7-11EF-9CEF-E299A69EE862} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1096 iexplore.exe 1096 iexplore.exe 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1096 wrote to memory of 2212 1096 iexplore.exe 28 PID 1096 wrote to memory of 2212 1096 iexplore.exe 28 PID 1096 wrote to memory of 2212 1096 iexplore.exe 28 PID 1096 wrote to memory of 2212 1096 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\16cb835600531a7f3bfce869003c42f9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1096 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5291a2844ab13e171edf53d6ea67a2206
SHA118cbe71c13fad0a7d3a77c342297b3b6e542e7e7
SHA2560f703389177433a4450c51f40b1289ff6b20e3659bca9edc25edde86874dde03
SHA512b656aa8fda2bc8f9619829edcb29ad5f06a56b66d7dd194d05191b6c5ab21e41ecf739d1583b72c91f727bc99e4ad03ae73a9e0b4c824a0dc5dc7401a82121c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2db1327184eb94912066db1eba42eaa
SHA105d86a3ea2c96c95da511d7989767916ebea521f
SHA256e8d4f8fde7388345811303b73f6f6b7cbcbebda7475e80099cddcaa4e7d44a82
SHA51261f8b0b630c67626169a43b7d13103897962314905d62d356c276031c7e943a61d34a9b9452d5e1e7dc14944a3413d95962fbf42b7aca45b93e2be3aa8888577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57736ffc6ad2a253d82f7497aee1c7a3d
SHA1d6692a020e7024f818c1b021b32dc8d546b9fcfe
SHA256abcd85db1369fb3d3d822ed2542e89648204bb434c2eedb172ee1cf81fd630bb
SHA512c80376675cdf58b2b142c38d15a148445bff14da462c7da167ecba8666c4a613dc25b432cfc87d9a3a1e19a596194ae9cc8d629a462a5273e6c2b8ff11efc12c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551e826e97232199de3ea3ffd4a3bbc2b
SHA18a58e13eaee21e4fdef782de5281671cf1672412
SHA2561e1d094ed50a30d74664796ef42fcf8c39cc03126dd960009a5e8b8944b7b0bc
SHA51242658a04fd6ed9fd96c9fb62dddb31fbb026c128d84ff4d0aa48b6055e26882694db43066fdb7082f987b509fb475573ccfeb3ed7a688283b847d262dc8208f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b27c9a195dff8b565ba988ab8a664e34
SHA189466c7034aac4f2335baa20c9010e42e8649627
SHA25671445ea91ea3c1490068a8993661cbd5fc837a5add1c9e021aadcaf5251331c3
SHA512e7799608923773cf99af223f990df667a419ba9f6b6a63a8c9890b96664d13eced6a85d71124b042103faed35ac09ae44cd9565277ff3c9ce7ee73f74c23c1ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e7f9421a3d371f0b1daeb4b28f6e75f
SHA1754e14754046c961fc53fd292f09598271974227
SHA256d5d1b3f01d9e791d25120155982e9ebcbbda57420483c3693b087b9153b80597
SHA512002afca2d09c199d8bd54bacb190009de6b4ac2af9f7641ba20a818f9f96d9a9dac86baf2e7384c1e22b4c593f5ea03cdb2f9d5e093f39f232e93c9a70648469
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513a3f176ead5e0734e762185e4019b8c
SHA15b292c09720fa452ebc2de925c1c6d1769517d21
SHA256570bc7658c29bbdd77153468a81cb4b4baa142abae79579a6e4ac0065f7976c1
SHA512e4a238e6ef62827e51889aab33a685d22639bcb4fae0e416d5d3f5184c2e38dbd35f76aa673827a62afb73e38588a9b7e5bca64e628ce7c49c7e074a52531dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548f05002510c58633a58e2807262b886
SHA11634e8be4753a70b9b98491af2a6779b92cc5bbd
SHA256a70f1f8fbfb172d33cd04d55a7f1a727b6b5a0f5a573152141942b3985df32d9
SHA512eaf2619c878ab1a983b583e5670c5deaf19d39956e53ea6ad6b5ccdb028190f0823ead9ff8c34ba942879f111fb40bcfe47503d9c0b9c1e88ad763f20a52efe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552e52cc38464944c02952ade1fee0dde
SHA1c608f5169069e0ba14bf31ead3cedb82a70f0485
SHA2569f6b232d86b0fa897be5364f06c14c1da94e7f4839279d43a8a302174e556f4c
SHA512b7c2d75355199b341755a5afaecbf3810fc452060aef13739da9150d165bfb1ff6d93dd674314ed5d493d7e52e3fd6b6850a5aafd1c0bcb91f8a65a94a30b177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587a03376b3e99461c0b71eaa8f502d98
SHA19fd7aea4ff5fcc92df224b81442568e3ef4f094b
SHA256da89321391c70e149f28a8d1042553c0f53bc60133f1007ad4e2bea42583f1e4
SHA5122e47836419916ca6abe524ca1d33572f887cb640cdd1f9fd28eab9a43d692c47acfc2a99e161066ee339653f2e328fd8ab83e1346054809cb9931afa49424477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bafa4e19a148692dea24236caa73dbe
SHA16ae4f3ec837aa2b73452a10e0c66b7e5f2f08a4a
SHA256238ce59a314fa79ffb5bf401ee5d3ff9c7a5d75365952e1ccacdca91c36ef712
SHA5123d94b3739f65f15d86759431dd8cd52e14043be4011791de09702ffca846de708b390f1b95bf61cc7ec5c898eaedae3352f03bccb0ecf06cd82b7f05d0a2f825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5799d10c39fd822a558251608f4e5366b
SHA1fdfcf87402d6b7d4d1481ca277204add48e95e47
SHA256863f43a745dcd3ed4feadfd0665910f7d1130592b74bc6326fa50f28bb2c399b
SHA51221118deddc87602f4275db82f1e6ff20f1517ce0d227a320d3a956834bc359ad9d3e2c87f233953881190b0e1a9789f6b6e9958630b9be21529fe3ea6385d999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fafdfe401cf64212be982a590c8fdf3
SHA1273d6fb1254777d19c154e3ee5bbc8b9a515feb3
SHA2563925e5a86cf486983a07ecb2879f2bf9396648fe19e32ed9b37f2408509287d3
SHA51219751d603a0462adbe810656694a69081a33d5cca3d5a79bad532f0f1cdc01bc5baee9504de5b37cf95f25cc820bc5d26c18440505976758e5d81ddb17acf8ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eacc2980541b00ddfee664e52bd80cb2
SHA12e742e539314b45ece3322c62509efc93752105c
SHA256fcccb042bae3ff84dba7a25eb0298b55c85c7e017ba020e8fa4b1db435b094f8
SHA5120aade4de9620a6ef71a212e6b6f6a12c02f666b5fb63c48827aa1653c3859bc6c8fe519260b0d999ab049d4ee51e4114359762386485c148395b028909464a26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5219ccea4dabdc4ad68e03fed2582deb4
SHA1040bea55da9ecf3f2c7f55a9b0a8c77129514131
SHA2560353578eb70842ba601223dee5c1237b55fca83efd71cb2a38c92aead5b4e18a
SHA51256589ee8f73195dbd59070127a6b56f3fe6e30556b241cfa584b0159795d7a450bd077bdbf2bcbada181a5a9e0215369a6e0593d087a6cae230b5a09ac472672
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57450b1d69d90138c9b6c659c42d9aac4
SHA1aa7bbd06d173159fc661bada5a8c9df027082c02
SHA256b1fd40cbddab37ae79f2c93c5bb72d1ab7471591f30ec41de50758cf27711614
SHA5126d8bc3b87de4081afd2efba819ab7c6126f91df3d9fca10d2b5e7c32ec441bd03657af94be394409e102a40e184442960548b225d30384322577fd45f10c15dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598dd1c07c18eb6d3cd158eb81602ec94
SHA18fa1089bfb74e1f00a516acbc427356fa450d0cc
SHA25633ce5793b3025bf3bc75a17691d6c0ba45027373a6e19b4e9d524f7e88594b8e
SHA512895c38032e169e048cf190b1710da4bb7021c55b322c92173d466558db7f9685da455f3301258b5ad36737f4232ae5cb88b8540d138f4869ff3912a8a5f1af48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe5c03b663707f5e1266e87b3bfbcf6a
SHA1813c5a42dbb19a85458b0b805b059c707eb1e60a
SHA256b3b7a74c065aa5f5012452446320886bb8219ed1ef0d62d752f6338f6c95f6ab
SHA5129eb6af5dbc8d378d77302ad06efd048a70e4476fa2b021741bd2dd461ed6d0446a0e0ae66708ed368632dccbfbae53b7e0e2235d7828751d6efdd80c624e5814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ddd9120d34c811ec3bc692fae8ccbc0
SHA1fab54e2f713ed0f6199aa792d53ca1cefc39703d
SHA256d68d3b6cca55fbd2fa0ac023f6094ce129dbd4459c7af7415ef0bcf1f0b19e45
SHA512a233a8ae3313ef1558fbe7b66fdb16f1629882dede7ec30c8430ef21e3878221147092b13c13c5ff91f2e2c4f9a48c598d41a595c001adb69caac12ae0b2e670
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b