Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 06:33
Static task
static1
Behavioral task
behavioral1
Sample
2f510c221889b86fb1cfbf680bb400e8_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2f510c221889b86fb1cfbf680bb400e8_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2f510c221889b86fb1cfbf680bb400e8_JaffaCakes118.html
-
Size
53KB
-
MD5
2f510c221889b86fb1cfbf680bb400e8
-
SHA1
ec0131c6044f0c814644a62affe371805368041a
-
SHA256
92de8a3377bfbb025df23b14a131b7ad902fe5755aadaa1bb444db04999d6300
-
SHA512
6da1d2357c3ac43db5622068b087c7ae991e2f4c0b3e089c8f896b6477de396076d75f6935e46209fd18f787021b7505a20a04d2c6188e7fcbe2b1bbcc2f06cc
-
SSDEEP
1536:CkgUiIakTqGivi+PyUArunlY863Nj+q5VyvR0w2AzTICbbzoh/t9M/dNwIUEDmDA:CkgUiIakTqGivi+PyUArunlY863Nj+qo
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000ca05ab58725cfd297e0e12824bffac895ec719c4ea2449fb084e5cdf49c2a90a000000000e80000000020000200000002d8d4a0315721b5d1b0855e2478e1f94b0c6db1c1536d18e9ace0ee8bd2fc9ef900000003d9cf02e9e0641413266915abedb5b014a66f1ec923ec3e212b8ddc0cbdaf961b68ea95257e99aeafed0f63c0a163cfb0f4aa5c9d50cc58a1b04942c0255a94647e105bebed532a4e22be4ac503fb3c4cd0956d591ebd4406dafeea127b0608a7995dc727e99e47feda4937cefce8ce4231f9a0ad4c97c3f0623a2021985896a758071737e459305e1560323edc5dee94000000010f994a917745ace600cb5ff02e0ed7d4157b00ee4ef9f4c995c46cc8add669df52609700f4e7208c31875e4a876650992d00fd0b0e9285f41a841f6f82b73a6 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426682805" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000b689a01df078c92b0d0b855fb57cc42402cf440909450c62dbfb670f1d01f1e0000000000e80000000020000200000004f5182d65249b4f02b081ecf975ddd2574d794c00969950ac57bccab44c50f24200000008c26a79efc59dd3c1e03c0a13e927099df53d96327369cd96dd9f3959d3e136b400000004b3af49aa595403b7a7cf27361046ecd3482ad9f4400466a3fb6302ff27a9f09371163c04df08be167e33b95088df66f2cf49cce73c0371ccb92417ccf13abb7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0C7B83B1-3DDE-11EF-A504-6205450442D7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0035de2ead1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 804 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 804 iexplore.exe 804 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 804 wrote to memory of 2948 804 iexplore.exe 30 PID 804 wrote to memory of 2948 804 iexplore.exe 30 PID 804 wrote to memory of 2948 804 iexplore.exe 30 PID 804 wrote to memory of 2948 804 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2f510c221889b86fb1cfbf680bb400e8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:804 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c71fd27d341457d7d8d8f2917c395db4
SHA1749f98ce7c96c49faeb1efa36a3a8787882b9ffe
SHA2568f681b09db16c80dd269757430f6d62e51d72410f22d07164ecbf57878b4ef2c
SHA5120c6b14803f6c09b5c7a14cd60fb473b9a81409662a2ac91596960f2a284f7fd9cce77b494287a6c7c1fc0d568dd68f938f827f401d789c83b22b24d079ef73e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c44365d42a586888d214a3a00ef6495a
SHA17d65b54a749175e5dbe86407181ce79c6760815e
SHA256ba9442bef336113d7028c7d5c5649f7e825cc8a60decf53ad21b70fcfb9c5fbc
SHA5122a4e31aee51d3374cca52c4db960250496cc134153a0550ed987fbdfef2bc70edfb573ce46582e6742997c2ed4932cba5c3ca47da3065a6e1f12b24d658f0eee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d645d03594dba60d432a7f922cb495a5
SHA1373eb332d469a9965bec1685a441bf62d6f3867a
SHA25634a1c50f30ea67d35789c4d3dae5dcab44f44ea304b5b6e8b38351ae2c4f4d30
SHA5120f49c64dff842b88822dbb389c0490db844ba124118d62f2dc503c9739c697646e6d4fc244493adb4780a827eabf3bd92e204723cbc307751e0a5d3decf7b2aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e05f7450d54012a534ad9ef10d8fab5
SHA1871bcad5cad7df71f654790a2a1ae64b2c3143af
SHA2560cacda117cf96390c7a3eb3ba25edcd903f675ec60c03f284e4237acb12afa48
SHA512a1cbbba07673f67a6c21a4014110b3b06c4cb0138c78b52c82aa0347e38266a8cfc1f18bae12b1c27c19d29f792036e3408509e0679890f50551441d7f52fb41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a0b6807f76534f5ba24963fdd76fc16
SHA1fb91366364d1912fd3f6c7cd5deeeb567ecbdf55
SHA2569c4e0cd27869470c357e091b7651f1fec2289c7464751eb06f16ff7015e84b6e
SHA5129a977d84e95513997e9d66fb63a0fec9cc0fd58a08ff4bb002640715d671fea57703c1111286349ef675ad9595520a6e77028ac1513b5f89889c46cc5cfd9e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5228890feca5d6a34eb0eb2041d9104e7
SHA1ec63552c0e6c3b03bc4a46ea04fef6cd0920d32e
SHA25612ab3224ce02b6d90c22e95b323450bf83930f646e4fa56c63f8d071e8357788
SHA5122c4319e083639238ba896deece8b963515def563c8040e91e5557ac5811fe6f61e770024f198249d2643202eb9ebd951d88f423c9e016f80b3df21418014a5c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bb2fbbd03e0f25c867088d465b2f516
SHA1962f499e40375f85077cc2177c7064b40ca587d2
SHA256b7748e101cae7f793caa8a027f1b47e3d8dda9fbf526747f170d3dc4ee29e408
SHA512a5205e0dbcb72390f812b207fda01dd43a32b063a0e713ecd601c309d3a821d4fdf89292dfab068be11639a81c9e15fd7ea5bbbcfaaa1cbabbd09d4415eabe2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5432e80e88e3e927c69f6ba104012524a
SHA145e765e2562531eff352b322406198fd892eed67
SHA256391ae5439c87213c775e9b7e246671251f7661a6fbe12d0d2b53f52e3110bc25
SHA5122692d05585a9fdbfeda6682dc26c189962038584aa01a430eb78270163f42328304da4bd46fd1b9041a7c0d3c37f75cca10a31838d7638a8e66514cddcbe70b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc22d515dab26c34a64344b874146acd
SHA1f255a8b15e70b25780cd2247f328126646f995d7
SHA2563a129541b5630249d849a0c91b3f454d6dfed882596784fe3e250fbf95607e6d
SHA5122e3470df86e7fb912da10f416bed5f8ab1775dd8c2ab5426a048d192c4b4b073e556a9b7fd3034887adf43f8c60415768486af9f76aa22978f22849e066ee5da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528509f05b1619e83f3b02ef3fd0bd98b
SHA14dcb0c43a564a09b433f1171f2a9f450fcf89cbe
SHA25642abcfca17ff13b06b310064b2559d23340c3e6ab61a7ba1ef1c36be05237d7e
SHA51282d4e406eddc3bfad1c66d10137fd16c3bad8166c6cb2172d7992ed73615ab36d55ab23540f838a3fd254962d240fb3602f54bb859378c587750d078ecf44fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a3df8d31b80d2c8644d351c32b4790d
SHA19477bcb10bcfa60e242c72974bad4390662774a2
SHA256d4de59d4aac4baa114675305dcb827e1993bac5dd24f6c13cd980e7e583b49ac
SHA5126cee40d2656695a477daf92143f09f3040dd017c12df776f5be2fa8d0354fe65922005ee06b8a53ffe691e40bb9be828d88a8a4ceb922a2aef4d0ad3e06693da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501dc7a4379146b8661d877fd7f1ab7a3
SHA136a452ae3a077d17916cc96f80af550dd33e5d37
SHA256a12da7aa8616aac3ca1a6a2278086a1bec93b7f534fc234c3ad75602311887c0
SHA5124b4009848d8e27b1ed66983d8cc0f3f53037c88d2215b0c1a23003fae75a220161e3ce1aedfae06226e0b577b561738045bca172a689abf2fa9ece61577e2f45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1ad007164e85886a5800cdafe96ffc6
SHA11181673481ffc9cab3e7b9072c2d9feadaab5926
SHA25617e970f4ed30f393cfbe90c93909625e92511a9628c0be0642d4b80e2af4f035
SHA5121904ec08b3afcb3d1a2afd10eb57575cda5e89323344a454b9c4101d838471901b19ae24db641abee1ef7d52ee20fe7c2a0356d8010ff624e09e029815c6d052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcfbe3b01403f8f926355a64e4082dad
SHA15002fab7ce5a2a5857d30eea23ae42891d0c1e5a
SHA2564655df89dd4af41b434ad7f7713d64edc1d2193dcd7e88fd315d37c1a51419da
SHA5129a41868186fb6794b85eed4cf2d1b3cce7696325dc40b2451ae5508d0465031b18a9cd9d489235d95aeee2cfb2c6a568900a427cce1100857472b374d32d47ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ee3cde90069231b7c67c3fa582a12f7
SHA1d97239dcb2baccedcff991dda3ffbf4054752ae4
SHA2565eff4f7e4385bf3d7ea24479b7ac6f9359bb2f12af8173505c6f685cbc9e4326
SHA5126376b781a56a6e242c01c062ac6b9933f642e5b03c08a163953f4735652491dde0aae4a9c3973a5b32bd0011d62e29c55a283e72e9ee7f0269c5d7c3386ba1eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54217a2c8af696c2cf311cff17ef753e1
SHA14bd6290d14366ce41c6d8a610e7d36ff5226f300
SHA256047013e791d7858100d6ae90e04638889b5462d8166a4684ee4d5c3bc5d75ddc
SHA5123b42c68be0a7e4a14c350290c37baf38dfe705f135ddf4d1bf0c7a5108de4b3657c39ace2b0ba4c0b193a6357a70db0ce54ed0f7ab6e1fbc5bc12e9edf46b844
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4e21e5be2a4e72764e490747036a884
SHA1eaf0aee68b203aeb0bcc5e3e1e5928baea53f51c
SHA256a95f6ae4e9c23364f4170c62c91406432a77c30dbc8c591350f293ae38781346
SHA512e4b4d90c82bb1513417074e3f563d28d731568481af7076828496979ace97beab5d1fc67b72aab3cfd220cf4c6eec4c76f3cf4396b1326f53a5f44b7398caffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ded3ed874345c397873e0ad36b24251b
SHA183459c668a78e7648e64949d37aa763b03dd117a
SHA256a5e35060e4905476a540c44521341edf8a127e5ab36b76e134dfabbdce34b5a5
SHA5123972daf828af4e3e9e954411fbc4fd872d0ce0c0eda2f5fbd6fc9a417385ded5db1c6ba932cfa528b25b2e8d5dff4fbc72418f0c48da556c05a43b0a8469a6fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50117884d5529af48329491b5d8cc8f5f
SHA1f7cd71c79ee5f0a4838b8f0c75dc2f2d47fd13b8
SHA2564cefc7f663c3eadcd4b1db5e850f0b54b761e2bfb9e62c616fc62d5f76c6c32c
SHA512460789e2c9b9120681d395e7ed9838c6f6250e3b8f05626e51935ceb81e8a7ad47a86b424f72c5321d1c53063ddba4b20971123fd6f688373c711de2025f24cc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5J67VDZD\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b