Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 18:55
Static task
static1
Behavioral task
behavioral1
Sample
70d26fe1c6902ecac39bbe7e04da0e10_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
70d26fe1c6902ecac39bbe7e04da0e10_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
70d26fe1c6902ecac39bbe7e04da0e10_JaffaCakes118.html
-
Size
26KB
-
MD5
70d26fe1c6902ecac39bbe7e04da0e10
-
SHA1
8330cfde01f11b15229a7d8e9fdeaaf6b136ad9f
-
SHA256
1db76ed90cc8038be7f3e98016edf34cbe7e0f03842fc007a521fce7cc8c40b4
-
SHA512
09fe22822e04fe8005ee330cf0fa486492469f02500893209493f46461a815de8ba8b1ccb2935d9c0e30bbb7af833f08b61857dd6808c449911744399c9d9e74
-
SSDEEP
384:4+QfPFd9QZBC7mOdM5uBKfpC5IgSnbmFe7Ackt6jakJvAgo0ixAyPd:Zcd9QZBC7mOdM5LpC5I9nC4hIP0ixJPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a09748d2c4deda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000001b8a8b9bf6c8d2ef54334dc73e94bfb2223d2876bb437634a5cd9d99c6bfc880000000000e80000000020000200000007d1b13e3e30aa6187014e3bc8626716dc97766b178d8e320096cbb2ee6a56af390000000111e6e9d97d13170488022f190ddef523ebd8f81010d4832e5f3c37f23c4ec3c979598e16d162f6bab0447af196a6a0fa8aa9881ac5a9eb07c6a8ffec9f27cfb3667124ac35c6b5fd4b91cef9f07478d360cd704b8076282636e712c05743c85d8f59e0bd1c266f120ff841f6cdaa8b7b7c6063792fb4359787c0a8aec0c554d121f96fea8a500e2f64e1aa19c67c6d74000000010fa3d0e48bc1dd7ad35d1ca1b2cae806bb2a1287f90b455c2b2df250ebbd7edd3facd0c3a4fba4b693335fdff2363b49d8e44b090b788333e9c3f9b4043efda iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FB106141-4AB7-11EF-8912-C644C3EA32BD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000060a8d9d85cd335df5547afb1b8960e615b1e348d329f76a5e8ca61def9a7b988000000000e8000000002000020000000bde648eee42aa82f4ce1e7d889a357f525474d641bf1e2d6e1cb92da5e9ea6702000000018b0cda874493078c7fdc62ec64c8be853398a54a98fa12c214a64b80cfd534940000000a8e4d2b4d77f79d2ce66bba047c21fdd292dbeb9f879a3469a308735a4ecb39a1deb92578a47891fb89bacaf63b3d7ba97949b3167882ce7b0d6383d88e366d5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428095820" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1660 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1660 iexplore.exe 1660 iexplore.exe 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1660 wrote to memory of 2136 1660 iexplore.exe 30 PID 1660 wrote to memory of 2136 1660 iexplore.exe 30 PID 1660 wrote to memory of 2136 1660 iexplore.exe 30 PID 1660 wrote to memory of 2136 1660 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\70d26fe1c6902ecac39bbe7e04da0e10_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1660 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599c875975b57130a7842842abcdb3d4f
SHA13280ce45302feb5206cf4f7c267aae59671102e4
SHA2562470a797bbf4f5b9ba2732668ae8439bb7b22258ddc2b742edec9d106db36be3
SHA5126981dfb7ead531b1a2a6935781f33ca159c5c703e65414ec65d11f0677245bba084c9f2a5d7f60a285e054ad31784dfa64cbc35f8184d9a6d8072fe7e431a046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de865e17dbc41a600ae51f85371e1ee0
SHA1cb9e6d52856657eb22eb3c88997287da3e44f71d
SHA2567c4a607ec42586b02140afa9cb81ddad028a21361d402ed1d28e128c521eae8a
SHA5129e58af71e2866b1e1c86ac8e0232b0784041273dc56020542ae13e04ee5c4a91d7897e678c596193899d457f7a8f68cad005b6890bbfe05f81ba506442f17d0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a86ac220e08813d3ef09ca6b86419cfc
SHA1d2bdfe4d919e13bb9cca61055bb9badaa2943283
SHA2561e5b65a66c8737584b1d526c319bd5a011fad369207d1065683d57a4f708f5ef
SHA51206d28dd3aedd278c42db6916a7eefbd297c9c8947377d35d124c105e174ba643a047a909fb909ef4c90f837ff8d5630a0a3a913e976852cfb855627673661afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548efbee558ae54aa82a8f141a2f6bcf3
SHA1d46d437707cebefbafb3ecfcf7f5e1ae84a1bdd5
SHA256326fd6defb8f28d3b4ad6669738a133cfbd77f930619062069f749c80bbec226
SHA512e05d096f3e831b883c1881dea183e68c3b6b5c0a735e6e08192b3e131069fdd64966d22e6a64866745439a9306fd5d763ca98dad2f3020ad5bcaf950c46d84b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50df274b22a2edb741069a2de0cfcd14d
SHA190b1aef5573e7d4684a3dff9ea6abda073144772
SHA256fdb47c40015025969ce4b54f2edfde10d1b1a65f5b76a04f0bddfa92f404bed6
SHA5126db0b5553a5b7d7da3e0e751b5a9aa0d026b56551f9e11c4b11a121ab62962f5975ea87cd8f674518aab96b5f4256e22d01c77987a297ed16c314a7f1728db75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d98239643d2b30e8a211dbd46b8ae652
SHA18ed0698b31bea3cafaa9dea0457040be8e2da0db
SHA25624f797e7ee0d52e32e2fe80c91dc30220f0796230068f3236f3f318e07790d47
SHA512c4d25494e090bbe199fe462f7ca9e1c207b9cd52af8873778ac2f59edd73ee7325ab3101fd8e9e579e3fb73234cf66004d94dd72ecc196ea7d2eb066a8953a2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503b9f4b2fd45c92e52de141c38b3ebe5
SHA178f17b7b59b465288beccfcf9e6f28bcaa1d068a
SHA256fdbb205cc07a6f3c45f5be63f26c29ebbfb533cad83cc6a2250e0fb8a4075e71
SHA51266684fba785a8e854bed466b466b6e766d365d9d58eb64018d3e63bd2617317d578d71c52465dfb88f1efd2526d0426e294e8e31c60af3786028876c768bff10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568f8ac0d58b9f1af352ef6f83e3ac28b
SHA107308d74fb740dfba9d39985499b646c017e071b
SHA256e5549987ae7acf62bb40659be8f9911c829eb8dd3015114c022557a76788c036
SHA51237956f65c5e39e085b112e457d7bf773440755a9c904e3137a6cd26bf46e74879b22b384a2afb80243a75da01838cab26bc9c05aef95e30e7cf627d247201aad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5887a4431bdb2f3fb93c8c0fb49656960
SHA1c8b66bf84dc14d2496c2b74fbb57a041c50add59
SHA25614e05c341f9b9e95d507aad2ed8b03f4403275c2c12567ded2fa8b5c019ecb8e
SHA512d123ce18033f2d480d42d6d8598986fb78f0372f787c9649a387564282978a253de94ac8d110e8ce6455f76580508b8ca54967883523b62a70f8df5a2d53f7ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef264680181c4d7626b7c538a0b89551
SHA17723ddb3d5c3804d2e77809a76a7ca948fa74d1c
SHA256fc2fd268ad5dd3c956e1cecaceb39090eff1d35db3f2195a64cd89f1dce75afd
SHA5125ca3d2969d1797f521db0bb67bdc4f469ee6bf253b0a87b40ae7dafdc2b5ace96a829c46a0f813d1408f191c0c160c59572280f6e813b00ca2f5f5440254310d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae6a8a7621582910a28a7dd718a34e05
SHA1a296995ced7da0be522cfdfe3b966196f3c2d412
SHA2569d9ae16fbd8cd070188763be5a03570c18331a79ab6a116207e98558bbebf8f9
SHA5120c58f937bcf527dee2ff5554f5115b35beefc4b1067972c97d0141a896e72555ec2ba056742ba60f9c8c6f5d3d6cee1269621bb7d81da4778ca1b39583a38a9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ad86a8bb31c2f410ba645c8d8d90cfd
SHA185c5147ec022174702a22ddf7a8d62be4379230b
SHA256fe0627d9944b88ebd0da0b65320ef523ad3e228fed7bc06ba0314ce85a26d42c
SHA51235fb29b64469de15b1f5332d609246b0aa0b95b6188081be7cf045f2cb7b2ab9cfe105f55eb3101f7fed10c266bfb9d45164ded4c1be75d8edc6e8451d460052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5346220380c4531085066b1c2f292b4d2
SHA1bd8403dfb733a03d4b548f77886fdbebb51ffa7f
SHA25608408eba98a324d75f33709171c3f34d9c01fc2307b149e2c323ca4d8191b1df
SHA512cf1abba882f2443ab80b72c749bc83bbcf0628a0e7d5ca76a9025b80e9bb9495f0b0aee36a68060e574360cfa08ca332ea41069bef9b34e60a373cec35481633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559604717c04b6f29b6cb91259e66306f
SHA1ef5f013103b96a8c4dac1d43c2e3bc7570035961
SHA256cff3fddaa2934b7aa48e65ec98dd2db37bf5096de77381cf10cff19490864ec9
SHA512aad212fa976610d97a45d5c3d5dc3466c29d40eda9f2ee24d3f01c969b2a8a2b4246078fad6dffaf989c24f7a517d3986aa004dbbe046d04704390160d258625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bacb7085062d5f0bc2d06907ed6a349
SHA1bce99f178e7690dc86ce69847836c08bc70d369b
SHA25639fe95df210e9ad4407d33b5f399bed01470614ceb9d55eaa27bb9e7c1d595ad
SHA512d7df474466b11ad3cd3939b3403073201755b0631337e11fdcacd4d516b371c99ba96d95c8386e1d08d3dc6aab73c08f065d8e198c2606428684cd5d9ba980ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c32ab24afdb143740caf7569ff375ee7
SHA187eaf53c4b93772de08a60a8c3af1d71be641b0e
SHA25652d7f450f1ed281f9dd95b6e26588fa712bc01ee713c677506dbd9cb7b3508cf
SHA5125d6b8e3e7e8f5f7da1cf0341d9951ce7fa6630f821b24e1f3bd57fb5f8beb3864eb5c4f3c34db0db4c5720445e05bdef94f89619c0e9ca615bb7423b257be9eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51741eb0835de6e758941f71135c322bd
SHA10f0a858bf3f3329c2ced32521eb90dcb85bcac3c
SHA256ee932024e1f0eb67023a96f5388f5ca0b88864d701dfd3ef518805523f4e042f
SHA512cfa3d6459bafeaeb3542a0d809f9d24fc10712ea3ae363bbb4d5cc59f4c009869aa43b6fbca2cbf1d657da303e0df9741ef1842dca1ec22195721ad467921d30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1d5e07ffa8477188dda02056d42a4c2
SHA16ad2d546b07136a80e196864dc3479704830f2d6
SHA256839e859db80533f79398d81d0ecb6a0422cf2ee78b385b9fe71616f94e935218
SHA512fb2743dd3f7f68e6e84ade849fa6ccd5c8eb20c5b8c1021ae806ce6ae96ccae4f248f530624bf9cdde359343bb7219bfa29efd02a541ebcaddb5fe011f323f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553896f4ed88fa99cad1562b88e49cd03
SHA1e25296643550332d91831eac6390de5931d7053d
SHA25600b6741f49669ad9549d88bd4e5e4d790b79d2c0ef1611f4cbbd83c8f1541c76
SHA51286dfc9d719fcbae6f490df5f28755e568324441e1604a0661a89594e554b27432891b78058676ad5678b64bf8459ecdadc4ea2558bcc54f6a3caab2c36aeb595
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b