Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 04:03
Static task
static1
Behavioral task
behavioral1
Sample
93933de0e0251ba2ad14827d5f794d2c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
93933de0e0251ba2ad14827d5f794d2c_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
93933de0e0251ba2ad14827d5f794d2c_JaffaCakes118.html
-
Size
42KB
-
MD5
93933de0e0251ba2ad14827d5f794d2c
-
SHA1
dc60c8642ce6a25836e2ca00cba399b80bf753b7
-
SHA256
dfecdf92cb71b2d7b0217d53d5e006bfa25dd684b1d642957f93317a02276c8d
-
SHA512
5c1ada55f61ce1d52c632066e59ec0315c5eb469ec103c5625509ab64d65ee281cc3e4b9e36aa2d5dde78d608f60e05914669e4fa85b519c8cf6e20c33caa91a
-
SSDEEP
768:tEf8//qB9EiYGdASLosSvEnvmNjz44vSeJS2XbrWtjzlsoBmpD8tGVS2t37VH70F:tr/SB9EiYGdASUsSvEnvmNjz44vSeJSX
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60c3d13e34b6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423635683" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6A38D0C1-2227-11EF-8D12-66A5A0AB388F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000009d8027807177a5d62c794ccbd9bf0058aa66892916f60cc725b95b41e63bd0df000000000e8000000002000020000000665bebdd5a55a9824c3e33ba6cb865cf94e66479d855e4f5718728a766ac8d8220000000f397116b00d27a9025a1083b8b36bcecd2464b5dd2e83651cd248a9a438c34f04000000037827012e2fc5ff3a6367f7c0121171034da38d81b845f2ab132a7138ac46c257e23a7a6dc1d1f77364627f965a8bb8c5526c0aaef82659a174b27ff433392bb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000006aa92d392f7542e3ee42acbc83853e9b92cb97734d725cf87cf35007098c67c7000000000e8000000002000020000000334a1dd8b982b43d3c53ec06d36cfff0c544708610ea85f9d4057ae64dc18e2490000000b6082d9a1cd33c0350db9a6eaf9127ef086373faacdd011341f4fc8dfbb8d2f4c34a369741a8982317a336aec83558c937d0536e4cd32513962a068df363d78137295150060d242e7e5bf4ae14523d8d79a765959099222f2fdb4b7b19e9f6e526cd50b0d4ffa398a10e04d0bdb4c3b1eb346f8233180277de746203b6edb6b2a566c3daeb2a73c2e971ff3662945c9f40000000b3ca1518bc62990348ada41ec31cd9dee5ae7adeb7af0456dd1f77dad8f4b61e9ef632daf793f619aec321bee6022f0dc84c6c18920d8f4ae2213f82fea2fa0e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 836 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 836 iexplore.exe 836 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 836 wrote to memory of 2112 836 iexplore.exe 28 PID 836 wrote to memory of 2112 836 iexplore.exe 28 PID 836 wrote to memory of 2112 836 iexplore.exe 28 PID 836 wrote to memory of 2112 836 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\93933de0e0251ba2ad14827d5f794d2c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:836 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6e4cd93d3e28029cdedb638634670d3
SHA1dd4d9af11c3e2f3d37576ef52d9b4e1fbf50ba64
SHA256eadf9c8689faf5840cb64bbb27c94bf0f2f6ae08709b9642ccd5ee89f9eb0054
SHA512509bbc2b2419d95bcd6eec56df4e43d5f82cd3a0b1f791797aa1101818fcb7fe8476e475462d16c21fa50d1ec7f3c573ef31a4cbc654698287f9c570d9613960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599402639b3233033090182b2f6649c81
SHA1caa321bd174d031be07f9174a5ac3e993f8befe4
SHA256f72a738f49700bd77c17f3f5d04a8d1ffbd6bc3b938321378055d52da68b2253
SHA5127c3ab08e1ca338771023af4bf700ab8a82eecf68830f491ff286d4bb70d02a40030d0f6a5808fadfd7815c08a3f9c24a925c515e90df073df4c63309c5a276fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee6b5c20658a5692e4f105f566e6c76c
SHA154dcf008ff85dabc28a3cc3f470926df05bc3b23
SHA2567047108dfa9ffef578ab2caa4fe0c36a73bbc404bd1e89c919a6a2d053b0f628
SHA5123f8564c723e7a3293bd1b912a2b72f30051ea2d8bbb43e90dcdf519135b0d04a4473468c605a5ae80bf0f9f9ad3fee2ad42c488bdd557d93a8b14a33b625a351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cc5b98531729605e05dc2cdc3820306
SHA132ac717b7e866faef3452a6bcddd2c32d750e173
SHA25610c36fa9bc74a77e38dfa131b70286a370f7b1c8976d14a94fffd9db28aadb8f
SHA51236b2bdd85e8405be8be009e7f24da0ebb26e9f99caca1e009526956bb9a21c966042726f83cbe3ef9b983511e810484f82eb538ef5bbce5f5640945f9dcd1d1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e6f57e57e41f03513a890a5d0dc9a64
SHA186ed34d32e51ffb9b05de355b8837ee4a0c04698
SHA2568ed2b9d8bb81542771f88c2f4b23df301f324954bdc30c57d1f57278b13f5280
SHA512935e022b05f37cb650769b8aae8469e2d6a5ab621af6c6f9b69fc441653dd674b37dd4e77e5c83f70ecac6842a638072c8c6594b5a16cb1e270f67cb11ebd606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5783902b901cc268ca4a92fcf0d2f36d6
SHA1f08c750c1eeec477b8b97878db62d353d4a0fb8e
SHA256e583fc169200d3a23263f8b8d9eeacb109115ef7756bb7561edc6e0d4127fb83
SHA5128d6248c7e60109f4a42ff826ce5d50c257ee7c7dc25e77d230718e2bb4b15e7bf83072aef38302ef3dbbfb14367f500eb260c9c04be53f0326cf481d00461dc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511de2dc493a6a8521afde38d6d12bce7
SHA16442ca14e64e369db70245ccd1d58f783d0add86
SHA2563c1a4d3dd64cce6f48e60cf953b4d0a39c5f8aaa591987da3811cad468391a89
SHA5125d7ce3cf23981eef33110929d3f9c47defe3c057ef830cd2e114107614db966f638dcc9ddf949fa18281c07de2fa7c1cedffd4caa08233bdd548c17489911cb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58238805d5bf9f74c16709b2296c63654
SHA11d419785f0867737bf3fee4b151df936dabe1f71
SHA2564a6bbead5ac0ca3a4b3961d9db966c330451bc0a23c12fdcecc3efb4b37710ae
SHA5129edf8f28294393774c58fd3925b9fe106909300eb7cb96f2b01c63450c3647a3753dfcfbb6720aa7de4e6446faa5654f948e562e42445c71e1aac57e80b82ab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2e2914ab11d031151f1670edbef87be
SHA1690f9e20840636a33316ed5fd4cc949c96120477
SHA2564c757d4c1142c7ea0dad5be86cb9831a8501327a3ddc9f8fb0696099b7e222fe
SHA512a95bbd1f9dd7bc5a764e3fa76aaf8c3a345b96cc97e8616d5cddaf8b1d5425680df7c9f29199625e209dd906493f959654993152fbec2eca1d8e6da696dcc3df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5081ac1824967eb687e8cc9c7940d8225
SHA1f7620742c852e667f5dbc4a71516c7e15dc4ebf4
SHA256c008112be07a05536511fc22ad80f104fed1251eb4c99a6e4bf02c048d2adcfc
SHA51211e2bf08cf5f5756cb242b47f70019e5d7e5dba3138f574bd0d6035c6128f8900a23e3ba2c269bd7f5204a8372deca9dd0951ef5ea08046556b069a2a96f7594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538f16df9fb8ed946ee019d08990c4d6c
SHA131e63b38350c0ded689b9006f36cfb10af499496
SHA256964f433e8e7065975b434779388b9a5d2afe9040f483a3175f278533bff26df5
SHA512075a51ec6c496c16722f08a6e32f7231c2d6b7c0da88bdb42f082a448862943e36b062caa7795c58a307af23c9b1e5f77a2386868341f5f8a57e3a850195b303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fc8940633dbd3e46e6deefe8874aeee
SHA1ba914352717c78f13db603000515ba408c32a5d8
SHA256785d6760680a833507468a6bc8b27db47fe73b1c613408bc6161e7b3b4368050
SHA5120020453c92c80af5fb50d4986efc0a7607ee9b832b8b3dacd26d13ac994a23d48db7d6aacee87e78c937eb3037141534950485ef5faf7791a7537fa394d444af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511de2652884de64df2078bc702f2fb11
SHA1ddd6414af5f93e9a54e5be7b02b1ac8b5c0d03bb
SHA256e6b6bb0e5c884a73956c970b610dd2d63e052484f779e2e82e0a92ae4748f88b
SHA512d4730b40feb8ae8823f367ec1e1c8021dc090807dbc4781ae56c03dda0db1c34545ce100ce0fe623b4686283361cae48df46c3c1c2d81dc0cb9d51a70f7c814b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5733f2285570b0eeb1b6bc03942d8048e
SHA1338ad31a0c114fd777c6501e4fda77dc84796e33
SHA2560b70acc855aee7d120515be4e6a540fcd9fbcf80e4e7fb6bc2c744f345a21fef
SHA512f11bc0e50973534b22cc838b55446ea3168427d990bfce338f04e1a817b54535d51f4c71b8a82e1e7d43f1f818d134eb431c7c9dc4d95d7cd6613deba24a7057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563522743c0ab812fb4acebeaccd33b6b
SHA1979474d6190be2325013ec4ddb75187f366b0550
SHA2564f6f4046941af10600d7df7e1407a9da4801e47e09e585f38f21e5079f18e276
SHA5126974c9ff892651aba709cf44e90b3f85f45a87b252504debae1423c8ece36742477377c9a789c9200dda3c3903e189a690806c011d7026ffc38af7cc147caf29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59503898e7bfa9a264fe625b09beca2c2
SHA18b0b1bc65ae228edc1e5dd0b84f75acc0df96510
SHA256ccb89e795692aca6074526dd9ffb38434fc0384c1a75f2d5b7a1afacc6cf88ec
SHA5128ea635d8dd2cab76b80ae80f0f793c67b9517b9decf0c04ac8e12a585d43484d97aa8f5a6a2331407208f1aa4209df3dd479fb940186f8fcd27898ae28a90a28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578f044ceb9241253d762bf12bb5572b5
SHA150fc55f09bba4128e34c263ef8c09c0a113390cc
SHA256972a93089fb2ab7a0dfd07597302c29ca833d5d8fc59743c8db69cb794ff7ebd
SHA512655a2c8d8e9b116ae1e8d8615e60c35cd07b4c1b01e631f6157393a2f09e8a295f36b21762c2ca35de35a29c5e500a5c3e93efd9922f3227552725285f313751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f1e882e4c3e7b8008156a42be3b7fcb
SHA1398e64d241efe840047a04f0572baa3a717b3f32
SHA256c9ed6638b2e4626d53c9d96019f6eda9401d652e616acdcef397b6071504c19b
SHA51245fe5c1f5533e6914e35a1a9bed92ef5b1512d4c8f72cfef56f61c69425bcd11d28f6bc42a98a4214fde0bd82350d965443571b41d31cf3f23b486c8e055f971
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4c7cc0222d5f54f36e855bc0d0c1cbb
SHA1f258d0e5ab72260308bdac4dfe6891cfd55e23af
SHA256113f3a7e4a2b47b5157dbc8776c4351a3e90534671a36df991d6f06cb9e6ec1f
SHA512816775f38c0fe5d2c9fbfd30d5b034c7fbb47757429e1013f505c98d2ae8d2949ffb759020339d92ddd388c2e57794ba2bfa977f076bcb352adbc1dfb7fc481d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b