Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 01:51
Static task
static1
Behavioral task
behavioral1
Sample
a0c486c374226fd9c39fc7e5ece87850_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a0c486c374226fd9c39fc7e5ece87850_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a0c486c374226fd9c39fc7e5ece87850_JaffaCakes118.html
-
Size
27KB
-
MD5
a0c486c374226fd9c39fc7e5ece87850
-
SHA1
5399bb0790db0cfebf1132ff8fe71fcd022bb151
-
SHA256
c9f654bea1727eb310b7e0465ba918be6b4e84e10f7d19c53225424809a57a9e
-
SHA512
b2a672a692295a49bb98bf34f00f38324d5010e515fe31bbc4cc199c430b0f9962a18b1a05037098503a4a7f60cef31e8d6767b833e4a6b190ea2b5405a86c1e
-
SSDEEP
384:CPXUhrNPycCHOFGSV4+K2ldvusMd8tKPJV0CXv0k7sT2jYvk1TGPjI:CPX+NPycCHO8SNldv2BOzGG61TGPM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000ad21e37caf929f04974b9997237aeed2e557b9defc30f1b6710b492e59928ca2000000000e80000000020000200000007d0eee05cad32b57fc57b86e6fb305ec099e0d9a2f7c19684edf121d925f3639200000005072f07eb6e0548a7a1fba3638332d22caa3b4a96c33c6dd8b93fa5509c8271540000000dbe402e8e4998ed2dbad8584351fd18fa651040a4938b52ef442f7cba435bfa52fe86123e47beee6c3278db1f007e67486c84aaf1b0731faecb7d14592b5593c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430021342" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2F9B7DC1-5C3B-11EF-988C-4E66A3E0FBF8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000e0aa18e2d0544d3eb5cc4e54c9cee1872578310cc424c54eb71e71108371435f000000000e80000000020000200000000d403937ba8a4224896ea02330462dfdf08aa1a3f807c284cda276ae9ae4e33c90000000cab39b7e2ff0b8a74e9eec5d8c71faf07af1215bbc8d6969cc9c942b0b15d756a3d97f8cdf3abe7a4266da713b5f45aa7ccbe93fcc37e08b12f4c27d5888c235ab0465f249b710ea1b210298931cdc0efdae9d0f9235b7f632e3b44d09c903328c0549a707234e4d06b3e84015b4596744d180780222f6aaa982bae59fe1c62dc64ff678812c92a5fc889e587734a38e400000006d632bd85b7b615d7c7b6ea7685161003757e3c7298b74b0d3a1f8c6b20df841c325ba754d314efb3a758d2bc2d2e807bad5658edead02d71a4f915e36a547da iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d04ca60448f0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2740 iexplore.exe 2740 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2700 2740 iexplore.exe 30 PID 2740 wrote to memory of 2700 2740 iexplore.exe 30 PID 2740 wrote to memory of 2700 2740 iexplore.exe 30 PID 2740 wrote to memory of 2700 2740 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a0c486c374226fd9c39fc7e5ece87850_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563f38129a2353750cfc90d8df13d52a5
SHA132b7664621b151fa7861ebe135e25eabafc0dcfa
SHA256bada1d16b4dd53305fcd5a2fdb4fefa9cc53384cceb2eb11808e32610988fa2b
SHA512a435e2ae742c0459f77b10e1fa11b0c723e7290e6383887fe072f3074ce8d7786e3ff883a2e339474b855208b4c676fbab1c056dcc148a2e07ec3fa7e9987ff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cf172710bae3369c56c80c27f201229
SHA149ec5eaffb954e329db4c50f29ed4c480714c6c7
SHA256a537ba37a60bac91050956b69828efa255990a1745f90e8a3e394950ae756fc9
SHA512a0ddf99483dc5fdc09a1174c6cc17f712bb24dd4ed19054430281504441ae321de00d36d42f9169f950b26be4f8c118818e5423f41b451577e962a837e4c4815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595ff6f3b707f65fa9d6d85152ecce69a
SHA1e30cf47a6474331da57a27b446c78753433d4a99
SHA256e32770e6ffd91d6a480f55a16f856a599311a237cf01dc9c37751d59ba2084e2
SHA51297d6626eb7afdef68ae701e45c9541c30b159d545aa8b12033c71410e72b0f292decfb316d39da69d038f0f026c507a1276462c101355fcb6b38da405500ccaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dcf725bfd7253fdb328621b6ed9fd9d
SHA1f6dae73e72cdfa6541760b84d2bf2d6bfa9af141
SHA256edfefcaa7a51e4607e112ec84d47281fd2dd0728620f79be5c22928f56a2b614
SHA512300d35cad1e24fef003d32b4de1d563b55a4e1662d2e2e86f156762d1f1b7164f2eea1e76435c1a102fc58caf52bc44b13b906438ccbc674b149782ed697f57b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6a768b1819dbb31256eb4131d5567c8
SHA117d260fca44e147ebd2ab0744e342d9501ca1bab
SHA256f7f92da7f91f96ed28a3b4aa01a22433ff2c09ff5a87d3bf155b34e18957bb4e
SHA5127b832500842dca1e0a56216b8740143d6eb842267641792e6c6530cf979dd5f9721ecc689ff5a527b2aef717b86a344f1db00f8c176bc92df34ecca6e623e1cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d09b23004ede77bd69ad15417ab768cd
SHA1766f82449bac24ace6d87dea89a8f3eeefcc1743
SHA25601fcb7a034497e12017019a3539bd8cc7cd0a2a1662277befc207e1a5f655b99
SHA5127afdd7727094faa520e68b7f1555a686f7088c58c78c083b7d99ec89b0a32aa146df97b8638f1d807a5b8bf84a1b162031ee83732a222a652a22508a9348e0dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bf0d5578e981a918e12532015f01a96
SHA119bba18712aee3523115b43ef71d6c0273c33aab
SHA2565e1c6dbbfd7f22518541c14ff160b897cdb831d7908541f227a7453dbcce369c
SHA512de676895f0f39d7eeb5a5c6cec1d0e7e6c042661b9386ac63bf8b4dfca555b0f2e1aa97802cf553768d15ad1030060cc0ce517f9e1d24581115d4e278fa9bee7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b0ef7fc419d97da1664f68982a81d44
SHA1a543c21bf9c270aea7d639ee1ce80dbff9a85cc5
SHA256fe1d49be0eac5d3fc6e4fd889744dd3aecc4481f4a5f22ab673f9eef80eec7ed
SHA51258707d908838ee68767c21c1513fd80b0e543a200de47fe92b3b6601c9348d003071ba6b8a337e28ffdda327cd2dc44ab41f9168d9fec7d6835e1cb8d21bcf5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4cabb7551480ffd1674dcb82f83abc5
SHA141a62476e5d1cf419ddf0961e846c55300ac0064
SHA256e851c87bb29cc99af12708efb0c56310d425f9b56402d9f15c75402c4be6e3b9
SHA51216770716b5672cc6bb29cd4410a01bc62e63fb34f982edc22ebb34d6d30128fe5fde4e39fa02d7ea70eb61e88109a63276eed80c723a654e631ebac892a6578b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da9a82886621b52f2458d9f1d714ec1d
SHA1618e094a172d8f13356eb5eaaf82cb9d6bb845f8
SHA25619987e7d51c8324d3292554389e6a6e5f8cd499a2af08e60556007aa0426187d
SHA512f96c16f64cfd26a884af32d38f509173a973404d100cffcf828f47a0cd6980f19ad6aa995f05953cd20d8212f3f49c20c70a77ec1f747457e62fa631565af631
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9cb44d6ab732ea530f540fd901628b3
SHA1cb608c8ac3f266ccae1873a7a5b1149cd8bca0ff
SHA25622fd4cbde4a21274cfacddc8c19811954991eb2a60eba019e729030982e1f55b
SHA51232cd3352322e713094eb85afd6e6080d0e70a06a7672ea969ed0246b139d814a142be5e5da8f06ba6ebc3702733f3eeae762c292571fd9bcae0aa82010a68a2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514ed05fe000fdaae560c71634346a8d1
SHA1b4e75bc100d32746f0f93d56c85d26941de5770c
SHA256d04eaf9573e7b046dba9a14bf8ae75c66936abd18f79bd60dc02527b7dfc7659
SHA512a11393dc51b50cde05ef539854377abe436950d75313760922af4b5d393720393847ca0a5a0c636ab4e6265d07f86af4895ed9f0a05331b84e6dc92c30c74ef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529382d262802bce7607b77104af4222f
SHA1a52bf3fe8dafbcf630f53f54863bb209d2c31171
SHA25627b1d9590d90650df420821d68108d1f880a488f17bd3ac0372c075afbaf8db0
SHA5121c6af30e8bc113a8ef9c07aae006950bb4ddc76df3f837b7d36ad08b94fd23d8a6f912d70405d533a54704e6e5be2ce0ea750d84dae11e498b0e1d02f88540aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a70519a7e33e188cd8b0f0d34153d60
SHA1b9fe2b6a3bad564782abb4718484f96548bf41da
SHA256f73a8073104c74e69e560c5346c914d89a37b8471b2007d8d21919c45fde70ba
SHA51265ba005a77064b2ec4451bcf744e5c0d1bc420f59cd2d0a3e4863145631d9b4529fe38475e2767ae6ab6a5e6100a0ea46cf9a9724fa850d55cd25b3a7a5fb3d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599d4d9717e2593439e2490771bc1eef5
SHA1b81d9f0b8d71d5461f38cf4390ba5bb1118f319d
SHA25667b6f62231cea9e376911739c1efec8bb8c3a988833f591dfadbf2138e0bd44e
SHA512b91766616eb45732a5a1fafe1229cfbb86594566f6da742d2f253392d31c94780196f48e4880340e244f24891425c14f6e908e63c4e1c6d9635951311314c135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5513404baef29b56765988e390edd8c3a
SHA1f5776822cbfa6eb55381eeef08f1276752ae5e13
SHA256648352f14507ac4e2017c41bf3bbbf9a16d161f7bb9efe42fe1fa33d0b119d9d
SHA512b968c4695ad5299bcb927405aacb7e22f2cf4454287a916a0a8899104fa433c538108cd294eebc8fd2a80aa699b0d506a713c904fc5d51b5a05b0a821a6fc107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdce78e568ffd44e7e9511da7ca528df
SHA128e8d443a7b6bc3d26a484a02d758c5622174f0e
SHA25670a431d9f041d417ae8f78c70c0ec23f70a258aae7d1e091481191ec1d74d85e
SHA5128ba132d663e35b9feb50f402b42845ab51f2b51317ecf47a629d501205c75fa3c8b3a53023a69adba233d9789c9b2ecd7cc5aea8fb1dd1eadd0f7b0715dccfc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c55086c03a52bc783b087364230b6fb
SHA1597d246a04645f03281f478bb7c9b88210ee1809
SHA256ea895594f7acb1012ae2ae2cfa1a5c073bdcac5463afedd73593ae61002e785f
SHA512f2d7359b9333669881ad6001751e9958c189e1bff01f44d3b9e8e1d6c7d533fe801e319f47477e6c513cee394a3145a7157b21b73d12d2fe6656d3c54b8bc121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586c9e5ad6d7ff81fd29bc03921847ee6
SHA10f25c1b6aaa815a4a9f1b8b5168f28a3ee4fc9df
SHA25683aaa38c7a5b2481b142ed9e28de5265dac32725245e9b2fca27b57d37e1467d
SHA512030e291c6e3f797a0bb6d1a6cdedbea79c3feec6847c0893b6734c11af5d91a3a39f78e92c2f41e8afe8459fdad773ecf093dca41770287e80d194f32067f7f9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b