Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 23:02
Static task
static1
Behavioral task
behavioral1
Sample
824240fcbb4fa73c2fb4dec0bcbc0786_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
824240fcbb4fa73c2fb4dec0bcbc0786_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
824240fcbb4fa73c2fb4dec0bcbc0786_JaffaCakes118.html
-
Size
70KB
-
MD5
824240fcbb4fa73c2fb4dec0bcbc0786
-
SHA1
5735bf2aa53cdd5eb3782363d8eaa23ddd97e035
-
SHA256
df42c4acd3fd03a8aa068a7081d15d2ad3d92ce0a9f7d6c673ee8f89a27800c6
-
SHA512
aca495248a9fb1e1d43ad579e546b4115a6a751acb7037370d2942680c697840d0797fcdc709d5de19af5ca7749253bdbd81f2a8c2d072bb2f78c942e564959f
-
SSDEEP
768:JiHgcMiR3sI2PDDnX0g6sJ661YYoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVGo:Jv2TzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009d000917e0bd684b8573eca821ec26ee00000000020000000000106600000001000020000000462f735aa1c34ea5ac17b10351add20e15048f2d399bf00e85205817c15d5e41000000000e800000000200002000000087e915957de86217c238c906cc61b100019051d7996ae2aae29684165e7522c59000000039a579d1d80f59eb2ef2ebc8952e0bf895814ae9c25cc8362c1572f39e31685c8d2cab0b751d899e16c84b985995049a84e6dff689a8f15f4ae41cbd23b1c2d712c3df17ffcd104717636707e8a36ad767ecd6fa81de47aefab665ab076e1f6af54bbcd146ac717f16777d6161a2a8af7a3351692124631c8e541cbd62b9a6a43cfc55ab34446a414488f1a5357377a740000000875db54869b9e0c993a84ff59772a3b28ecd9673cf9fec13212a672f7356850518f7d25102f8773669ee675469457001933999123c3c98a9eaded75fa9f98e20 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009d000917e0bd684b8573eca821ec26ee00000000020000000000106600000001000020000000ab076b942aed61fcdd7fefba1b313ebce9b4e386fdfd7df06572a4beb80c8f4f000000000e8000000002000020000000087dd4cf454d5546aeb7c15136fc1c24975f3c33fed3f5de7efc70e2ab48061d200000007f921ea1fabb528366bba1bb4f3baad72f48f68764a2d96aa15e3bbc02e0bbd84000000016024dd172057fdfb280d466ab847c995fda31fb8e0ef80a05b66160ff630e775eed08d79571fbfd215dd96bd922aad533af60c6d63cd07a919a3717fa117210 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30d559551cb2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423185607" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{800C5FA1-1E0F-11EF-B7A6-525094B41941} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1304 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1304 iexplore.exe 1304 iexplore.exe 1820 IEXPLORE.EXE 1820 IEXPLORE.EXE 1820 IEXPLORE.EXE 1820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1304 wrote to memory of 1820 1304 iexplore.exe 28 PID 1304 wrote to memory of 1820 1304 iexplore.exe 28 PID 1304 wrote to memory of 1820 1304 iexplore.exe 28 PID 1304 wrote to memory of 1820 1304 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\824240fcbb4fa73c2fb4dec0bcbc0786_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1304 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f6d3d4f2747e5b4764d3f21183bedde0
SHA1f73b876b12bd41a4dde9fd2f544a34a680d752ad
SHA25617186929fa499f6b317efbfbf4c4adde9bcb51e798e7f343429812c353a56b09
SHA512594dd66328068432c660850c3fd823b038a68439c875c886f6868f5e0e7c4db9e8404d6e9ae0249386836a56c558854c4ba4394585ce1eaa3bd586eec85449e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a231cd31a174a586e8bde0324e858954
SHA1e2622b56a57195c4ed0827b31f6ef59485f7f989
SHA256e63dd429797a0f273d7a66850837978844f0e17be0922a5feaaf752e795a36cc
SHA512790cbac192ca19c90448644469b17b60661764532baccf167f1f2fbca4ee90259a7a904880befaafdfcdbc6068f42b3785894a8a1f1871490b7f60a4a2f3f9bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD580d722f64399493401235c37614f0d00
SHA109722554a0eebdc494d83d0586d56461abb41b04
SHA256f0adfe72ef4e2952f68953df25c64555aa56f760354acbecbdb38ef3fbeb8034
SHA51207dcafd6b23c9c289fa207cc001472fedd90e5d0a8b992965116f6b4e2d9695bbccb29b58caf5b76c4f3c3f7c81ac42aa4d9ddd9d4cb382df09c308aa6753a61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD578e081b34eb01b42f46c2dd26e345799
SHA1dd26649e659bdf78f1551e17c9efea98f4b782d2
SHA256f9b35d9cf866041c3897361e2613ad52f62c64ccc4b411920b7173ac2608719c
SHA51235a1c4189907d00ae35b2ac996af7a6fdfc4bc1e12745e828b6ed2c8892529dcd86c5273903124f2afaca5dd427a5377cd24338c557a1f2ab3158c96ab7e699c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e62319ed47de20612b5b478c07bdb90a
SHA151a4d6d4d14833e77f15dbfa370e498f133890a5
SHA2569f2b201d15b7a5dda12b8ad16749c9cac87b0ae88c75be6f38420785d28c773b
SHA5120a84fd9ec7e0b302fe7b09c24154a94795eaf52c77728358cd95f083f42a6d55e64e3372a456472502b1f0b2ac1017524abc22fc78aa2de2c6167e5d2e671bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5335530d310a12469d8c0773cd1cff6b7
SHA16e6cef7c3c3a97b43342f33fe464385e1249519a
SHA25626b1ab448ec231d71cebeddf3639bf2bd1199f2d29ea520dbca7c2dc1d85ef24
SHA5122e61429e38cec0f769934fa727540d0aa4c667b972f2edf9f80511575fae810c70e63d317fc22ec55596891add077fe53084cd8ec16fce06eec3a108c262e5e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5498769d16e1160375399ac8f4b51fd69
SHA1f0869037733c063c272a75ad37bb662af84a0ef8
SHA25646b59ca45f07a249d736f510996b71448cc9e9427c397e1f112b68290aa3e1a8
SHA512e8bb471b06f9ecd3b7bdea8e365f4550eefc347c88fafa7d25d130602f2f533012cfff2811b9c0f95c9e8a2d5853a1fafabe1d7a656bf8c944dbdc9addf9c691
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dca677f6f1959f9fe006fa39159d3231
SHA14b7cdb5e65ac12d7d180f72e35d2df45830da25c
SHA25635bb5338bff1f1b4deff8426ab481e38af064ec4c613fcc69a6a9b6ba06eabc2
SHA5124d9c639119848d42ff29bb60ee420eee5ad8c5c53c23e3ee316034897d22edad78acc459f248f3f9e8b621159897b2bf024b9845a3c9a3d4288d8281a793fb00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53a1ee989cee2b807203cde383b203bd3
SHA12b1b079666e85f3f619f56ab3327215d38660224
SHA2568d7192cbc5ade42c88770a5ff95ee50ea313a713be822d81f3db29f517d9174c
SHA512fe7e5eed32db3182c369b70bcfccf1567bc3df338773badd75f22168d2482331d5651e29f3c033af2183d6405b601178064374ee80e19a868400c0208a97740b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e667f99f584bb6af9aed982dbc552917
SHA17248907896a0750d5cef17a22e4292137824f4e3
SHA25646bff5bbbad8c07f62c120a66c12571d1b9d0967f82a9b72688ca728e5de66a9
SHA512f277ff8963db91e1ee0f0bfc16ababf0dddac14b5633809cdb9e461f91fd0374d2815b6a2eb08dd592b3d98f0fc38ccc0b9037f3bacfc3bdd713a9a484ba8e8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bfa72bbc4c0853b08c4a8809d6ddd7b6
SHA1c317774eb75bb70bb1dd9b709503dee3ec1d402b
SHA2561065b91a837f8caa871761cce0183221fa910fbf58bcb27c23b82ecde6c5e450
SHA512a3482a4d30482cf51760c874f2703c73c3cc1c125354e08fb099f20c537b02dd8ba5f658b3bd710561f5ddb9f8bee1e316734de879d0afc7c907b15e9caa9c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5539e5811ea8dc74a4c6d66e18955babe
SHA1a55aaba9f1aa7f54a32b0b701cf57a8301d4a318
SHA256ac8f2495721a044fc1f3621b44699e70884f6f861861fa71d31667887583ca03
SHA5126d202b2f8ea702e5f40de9e073b81dde8e4b3a9871fd24a3d587d387fed372d335b412b7185264de95adb868c95491bbcf4d1b08cd95857789fb066809474507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54da89b80a151aaaccbfcc46a121d489d
SHA11644b1b4bc0d5f61b5b755126019c499fe632626
SHA2564c35980464ca877e767522751a6eedf1dac3f116bb651c8a1056f91bef2fd342
SHA51295838914e9d906b4fb5432823e445fcdc73af8f8fed8c94a38acde9a0b76369968f98be24c3e5bd992821b360313f5c48be63dc7c8f5c9c5724b8f9ac9922226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d2dc345103dfada108fe428e384d68fb
SHA1095e60950d867fbc3e722b6a423e3feef07dbb5f
SHA256a0a1168677d12fb99098f1ca0b536da15baa1149f790a76cffac0f235562c88a
SHA5129bf784f2b9c9236d7f7acda7c66115df87e8eb14a63c5be0eeeaa026a7e2e7ca9a3bff254bf746af7dd6f005c21d4d6de9c1af7b8e53622877e2a2faf3b0e3b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fa07e2c6a46fc6f7ebc3336986a4159d
SHA1d50704d1e576b95192e566a355c4f876c4415e16
SHA256b02a097f7d7cc75781e73d70186cbd0d7e90d890e70356531e04afde6437d906
SHA512e0b4e2378c9575f484244c50e3e00170a20510f622edb56378ca31fefd547f68628c64659d1e1a53c3a43ff391b3a1d9deaf12e02af10fb0b2e920f9d61bb748
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bc8cc1cf510de52e4a6c2f67070f1aef
SHA13344eb121873afe1fbb33fb8fdcd3ecf61feebbe
SHA256f5ea231a51f5de48974583ba475848efc9ff2a2236c64838f34cd861c2ddd0bc
SHA512f5f6b84b7881380a2d40139728a7204100b47933cee3f1806fc67378777209467e05a8cdb0b106398cc5de695237eae2b7c06d9fa804fde7fb0ed13c6b074d8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5201d1222cda84f770ee195013b3de458
SHA1d42858b67edd1fe4fb1900187f4a3e7205e43186
SHA256290d20adbf3e0fa6aa59588aac6aecff51fc27f07bf274b9ebf9838f154cf141
SHA512837a9ece695a34256fd4721b5e0e6c7d4e652c452103abd0d4deee855df9c088425d0d995159079a2bb486f925b21ab162f604ba190bf0ed0a39b969f71d8327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b0bfbd67001db8acc4223e51584391f0
SHA1c8bc828d2b1cd631a58a0e189e9dce8aacc696de
SHA25624804504c321165af841819d6576133ebf3deb46ccc2c5b1c6dba3b12121ebf5
SHA5120e4ca45c802cc1ec47c29b588a134f767569a8dfdd233e0050c8079bd3fb98bc30badcfe1e1eae6dfc426c80c4a4fe6e5f5b8b115200cc6c2ec26a1030cf9660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b56dca39754cf1b9a991071cda8318b2
SHA158096fe0565120f1315bd9d7cd9c5cbde74a79c4
SHA25662ff65d471ba3d830bfca2e500a056de3aa1cd83102a16e50dea16b53f2903dc
SHA51253df3828e1dbb0c087d9c188204a26bc7b1647d11138b633af67fb4a88a408b9ebad975596e62c4a99f2351b1f4ac2fe0f53569a0e66b4f428bf4f086904cbdd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b