Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 06:40
Static task
static1
Behavioral task
behavioral1
Sample
216ad899015efecb34fbf2e9429244ac_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
216ad899015efecb34fbf2e9429244ac_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
216ad899015efecb34fbf2e9429244ac_JaffaCakes118.html
-
Size
53KB
-
MD5
216ad899015efecb34fbf2e9429244ac
-
SHA1
169fff8312e87c62a3d9542badbd66a565bb0f1f
-
SHA256
58de827ea92c3f6e70f5b38aa0594fae113f768e8e6a2f976a805cc5f27bc833
-
SHA512
ed687d1e33e6c247780e35ecc733099178b7c0547e97690cba95e0d4ba3eb944468553036257157ce4dc4ad69c0ced7c2f65956ea89974f3c347852ffdca7c2b
-
SSDEEP
1536:CkgUiIakTqGivi+PyUFrunlYy63Nj+q5VyvR0w2AzTICbbroP/t9M/dNwIUTDmDA:CkgUiIakTqGivi+PyUFrunlYy63Nj+qj
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000063f303a9affcd34c9dadd14fdded9395000000000200000000001066000000010000200000007e3b06c862802d3e16dc755aa5a5ee2ccef932f45c78d562aee55bc81f6a32ea000000000e8000000002000020000000121cf3d6a2d97ee90922fe8b2a9bb242914f66754eac3fd57340b436694eb83790000000aa143da82a53474181dff7206b47b42a2c77e7ef531ac5ff624c2a7edf9a53258d815d9e6430c98f544df656f00b706aca0f7e39f54ee3468adba931a81bcb76627cc7669cf8f0ff6ef2d000c729d923c57a089cbc34bf41ad503c3269afc1abfc6d94928f20ec644bbf505f657131d2cba6014d8e93c37188596cfcf3431e8fd3cf3323f4a7198668de452632cba07640000000cc2b7855866cdc8fac79e9c51f24bb515ca422f5a40e06e23c84080a3d5717dce3a4571aa41130fad6c7442916fcfa44a2bb5c42f3ecbdbb6583d72873d6cb32 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{16DB5551-3907-11EF-9F07-6E6327E9C5D7} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426150675" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000063f303a9affcd34c9dadd14fdded93950000000002000000000010660000000100002000000075447316db0363e9b96749f042d0dc9346230d57478b9c81b7ca03450b902762000000000e80000000020000200000007ce9dd5ff3d7916667f9d44dc25f513c6ab7cd1debf167d987c39eb1c8e40352200000004698301e96ea9c1d9bfdf370449ab212bf73eb313ffe07ab10e757651a033cbc40000000bfee3ebecc92367a503614760ecaf12d51ef0ce5ceb9a3e9c7c9e2e7c2d6def54d4f31165ce7828e0e515f96e886ec85928522b69ce927d7c31a66172314f109 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0728aec13cdda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1988 2084 iexplore.exe 28 PID 2084 wrote to memory of 1988 2084 iexplore.exe 28 PID 2084 wrote to memory of 1988 2084 iexplore.exe 28 PID 2084 wrote to memory of 1988 2084 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\216ad899015efecb34fbf2e9429244ac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee8a5e843e3bd1127cbe1ba38146e2eb
SHA1bd7e86ceb00592a1c3a0b17566f212562f222e10
SHA256800d11b1831d85f3754648753c2a8092b62c019cb3bd3fcaf6f908426309edb9
SHA512c099228f42156ec02288460146b319be0b483801ea3dc3e8612ee5f928665307cac4b0707b4b27a848746e3edf13fb6db844381c1cdc91c706f5a63c91e07dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50148a165c0a2b4774db759d501b4d98d
SHA109028d880e7ec294a50cc30e5c50998994f78216
SHA2563f2248fd50c618abe7f0787d1aff2529a07cee8fc9ba22ded45bdd93022e47e8
SHA5129c4b17fd59239ba2b193bd81735b42b27abecca40b6927f6381efd95a0c09b8165c3b4f17434c524f101f2c2e79becc46426b7baa9fda2e6aa38a6a6e858b825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5236a02830b15eef10fbea9cd57bcbd1f
SHA1f47364e48cf97510b4626bf5c3bf86603f961c47
SHA256893bddfa8b31119ae05e3fc42a23318274708170eee70cf62a499944ba2d5559
SHA51264760164527ce4266da43c10d6db05460a3ab1837df9adfdefb30488f2c7f25e1d70441831b4a3a42c805de0220cce47b9d103bbb07ac20c9e805772ec1ea1eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588466345f624015f65b3225d49c29f74
SHA1508e1d636463e4cb4a83596a24721707af417cc5
SHA256119afe0c59ccd4459c9891195738f0a5dcb229c10a5c2da838c22330b9ec8bc7
SHA5128c531378ba4824e1c25de3537d7e78b717af196c348a8f996bb6680e3e8e032d4ea4bec4c17bb450dcf139fd424b175ed9d55e0e7e73952f56c7c5c656beefc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517861cdf77c0b1ece71454553faba3ef
SHA1124412dff34b5da45ed29b1561f75358bd420960
SHA2562088c2ca662b89b5682f539f1b6f3808e4f5228b579a803efabf842e71ebf3f6
SHA512ad8a3c2d6d6846c33e31cb5812eb4a63212bc596d5c07955b931be406a04b6448baf5c1a4a59523383e8ad72f099056f883b8c12ee339c07a9bc33c81078e318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567d9991453a73ce179a3f1a2bd127239
SHA1c4c636d90e8740bd3bd0cf33d467cbd0720c3f25
SHA256a55e3bccbb0aa90884e899409b51db9fea4bc1a2ef67e666d55525fd94b0080b
SHA512dd2ed4e160c927270d6cb56291f56d827a7c02a6fae59434c256742531ecc6e1c7a3669c7935b10d879195204e1821ccfd6573e317008c6bdb5ce9a30572d93b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b78653d5dcba5a359d2c047c1c80637
SHA1d8b5674630b19e216af53aa2dde987825fa6cabf
SHA256bc2378ffd67184df350788e4904a432cdfd57831a7dd8b183febbc49b6ad626a
SHA51268d464210e9c00bf567f58e15fe90189091ba57d91e09becc55edde6fd90b5c4c7887c5d2b00dc2197e82f86d3af18d263f53e1c1d77b72653d1db6c5ab3b440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5769a3594d6e8a9b5c41a9ddf84da8ad2
SHA115fbcfd88db5f86e2a759556d2a649bd632ea828
SHA2568fee2df11353b5e5dbd881631e499fd66e1bc153268b6e1f9489f5e385f4abe6
SHA512ff30c3c3cef2744b8d0fba21ab9e4dfc5055ae43fef2336c1692b7a2f5f1a4527176694c795734af8a1ab06085b16c04931ba83d474e80b7dde90e6d8e8afe94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e98c6702e1a3907810da18b7b36f1b52
SHA18ec7a13498c601ede1fd638556a8d5a974c2ccc2
SHA2561b548a826634c0c86a771cb136c79f0d2157e8e46ee0b5b4e662c6c1cadc9524
SHA51299f3773cd67902b55d4292c3347cd0740d2a3985049f4e51ace9b67efca93c916be4cd11b154f22013891c257c6c979c917d0e980350497fee3f5e538e4ecadb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a18e8198aab40e8384b7fde0fa9b354f
SHA1603a2fc943be21fc679aa82ce95333150dd4bd9e
SHA2563f2a2a1508771b81c2dd35fb3003424355c2e282139840d348de3430a77bed04
SHA5121387e8b80dfd15c76258e72492db33bfadfd09d8ff54615765a5c523b5e967780720b062cc866b5a641cb4152af67095099d68cba6ca73f62c03f1736e5f0c30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dce88dafb0b329bbaa3fc6644f1da929
SHA16e3deefefb4be7e5a6158d7e32e3b85370429f86
SHA2567472de0a7fcb7b43b3268d028e1b26f2a2285861ba8ce4913c0911395ae77d64
SHA512e1ee8cb8412d6b5f13e30f460a693a493e39018df076c447d39deb03749191d5441d0f689c56b39826ca7debf892fcbc681dc0709f7efa83b3087230b4b954de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f89385a3f646205db4b461e2ae14e59e
SHA11278e500bac9dfb127570b83deedcd101bd98e22
SHA2560f15330c195efbc86acd9f46aaf94cde61684673668c42bc84910b62d0bb63b8
SHA5121cb140033355fc982f5a55b4960afdb39d1e784dfb429ccb3b2bea026f67b044d20aa0e67f1579398242ed01b2148170ca50faf1b67fc61a686c62506727438e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4297d97827c6ae8aafe6647ae1716eb
SHA1cbd9d55b073445c5c23a07d1b7c21a244550d76d
SHA256b44ea3ce6aa874a85251029beb53dd0a2c555dce7b7c906cc3eaa17e084b5fb1
SHA5127814106b4c982b9856214777fda132bf044fea243238e92767fd3d2255942ac7bb89c4f16ea5e080672e609afae2394ecb9dde829cca7839182c0d5cca8b7afb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9b956de050290ee17f6a2624d88099f
SHA1a2a006d7aeff430eea4d8fc2e2bcd08724e3a27c
SHA256840c0cf772a0701599ad584df3ea7e3ca5eac22aae9624063d32a3e637e19460
SHA51249d8d637243d98ee783b2e0e615b876b75811f74e1d9e51d392570a04535703e57975c835169ca85c6209241c38c9f37c0b4e458416f72dd3217e8643141900e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516b7be1262d79ea56ad8530fad1c14e9
SHA14b3efbe39f365b9989e79c14a1b3b97dc1160b17
SHA2566954133d9f685165a7081e88103d6e41dab9def786a34f7ab79571f251cb464c
SHA5123d824f4ea2d9b4b3871e767cf1926bd65934d82dcd3c9d7ca09e81d83376ede3458f68298aa4a3231509823e1fc15a29cbb8df157e9bf36a02156abbd751bfe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d239e8717e63db05e9c7ddbaa41c2703
SHA1e8fcb3cbe10a4c6cc9488c853f0e6b54c240a292
SHA2562cd5b1d72eecaf2512432b27ec19ff3adea64cc6e61e91fa1e148f96750ccb52
SHA51265d26721bf3ae69dbc13425da5c148538ed31312ab8c460cf0a6e6f0426198f5cce30d306ae29131b93cacb9c3288767488ce039b7e3b9ea324409fbb1490414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5462e2907fe303fe441ab2b683400ca3a
SHA17f291a34c41f8354b344f90bc922c5b462ab7170
SHA25644c146a51f349415625b6b4db5c423b73a9dc13c0854eacc8f6400d8563bf362
SHA512de6aef90ded3b938a02282e15c543bc515aa1c9080d9d2f7d2ca07f3ec61df81ab6c4f32705433b214c69f720ff4704e8d0f887caae54dbca985ebd43139b570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c36ea6af974843626e5b4038d0927049
SHA18f3300717e9c05b6ae731dc157ce268d24acd252
SHA2563baaff5b2ad0cb64350dcaa15c78294e9deb12c5f16d473f16fd0fb3a6ced581
SHA5128d21fe434b47de74dc8060e8948f8662beac49dee5e141fd9afd3ba5ee7b9856f910f4301ce4886272076a037fca30c7d276d2f8932d4adec81facdabc394bfa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b