Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 22:34
Static task
static1
Behavioral task
behavioral1
Sample
b95ae88d950a99dde5a2cd07d5582ab1_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b95ae88d950a99dde5a2cd07d5582ab1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b95ae88d950a99dde5a2cd07d5582ab1_JaffaCakes118.html
-
Size
13KB
-
MD5
b95ae88d950a99dde5a2cd07d5582ab1
-
SHA1
a78a5cb1d976da5bed23c45778742f879ccfa8a1
-
SHA256
8dd5901502dd0a6152230d73b59ca2fed35c420805ebbbe94593fd6036232f5f
-
SHA512
8425600440b31101ac747fd3074d1b5cffce25ae899da85ab2c4416e3387b4f3d1bffe1a4780552e07a7a22afa880552e41a3863dcd0b59582cb29365c3adf8a
-
SSDEEP
192:SwL/o+cbmZrJPv3xasIUee5Uvr3gwwLZL0rMBQertjfGVdCWB31YsKXb3:SwbcG33xIJeiv/wLZ7BQer1sV91Yjz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000684b17d3d936261ddd49fdad0ad83c5a4048f677a48995f51a55b624cd8ecf1a000000000e8000000002000020000000b96c5e742171acba599c8f396303e66bd0cde9f8df74dc2418f69ceaa4eae3b3900000005c5e0e91e5f04f42b752450118547cbd5c49f5779b7d709a65f8b285c4a22aa3ecaf041f5652d79cb1ebb65a718c8fbbc5ded85d57abe581df617f8fcfaf46caa2232035619f2ab40bd1f5dc1c85c3e91c986d016b9e8c65c8d14a401dd3865935fb4d6572d3c230535aa1072aec54ce32da49be7089ab636589ab55e05bb2a266b4e6633a34dfa7754912541d991d86400000006541855abb060d25e22696a0f6efdd04bed19cbb009c5a504b72c7f59926c13c8e14777227272de0c99e23102a5e7ebcaa887d7bf2e5502c51289569f5b297f0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B71D8641-60D6-11EF-8BF0-428107983482} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000c75b01a64b11bc4aa749f2ea5fb983b37a849df966af4cf9eb8ec8fa6bd4331a000000000e8000000002000020000000b5380d41ab2547eb67f33632b4276e9159936d16da35278fd551c2db998ce9032000000015ca26559b5f6cd6c98d6b379b4fa0b9f651fe855e87a558b7629434c3924a6040000000df57e2ab8bb7f438459ad3969a143d7cef045ee55a42a42a9f4d60f5f73816846f941495fcac65f27efcdb3dd45663eb23872d9d7f59dcc3806303c622dcd8d2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0a837a6e3f4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430527946" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 776 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 776 iexplore.exe 776 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 776 wrote to memory of 2352 776 iexplore.exe 30 PID 776 wrote to memory of 2352 776 iexplore.exe 30 PID 776 wrote to memory of 2352 776 iexplore.exe 30 PID 776 wrote to memory of 2352 776 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b95ae88d950a99dde5a2cd07d5582ab1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:776 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52312abb1fa8b823e60dc3fee808e11cb
SHA19f3ab81cc36437813397c497ea0e7fde586f171d
SHA256754b532289c0d12769a6d9e4770a05bc7ba84a7770794f704f34c2c9b5635b3e
SHA512f60f76341d4b8f7f1147fd01ca6aa3308c1c81352565abe04f58398aef97714e567f16c5c60beedbab89ef2900c2471c1869e6327acf74cbaf75ebb624764e22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5898276659bd0cf28e87f6f4a529635b1
SHA18d5746fd22f3f094d677d4795d814ef81ee4097a
SHA256f239ee453adfe5d02750fe26d5d00ed938f59d57af8e6ca3b501300bd8d7a2fd
SHA51212a01c03f03a73e2d83df9018bb9242828342b57b1e07880dcb78a23edb9e1645327e0c902dbbe7bda51c98742e4695cf947d47069aae723c9d688ba273fd598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e9d486168b7cbe9a166cd27937af6a2
SHA1af49b96d759b7823e5e03fb19088642cc3c74b93
SHA256f4603b22809e60cb4d5eb3f295750829665e2ed65e8d41f3be702bdadb20a72a
SHA512a4005bef448a907ae1c96f7bb965013e454d90e55efa201286c0df3eff47b3617a5cd6801b926de0eac9418c2ae70f2934244213f964e3c26284ad19bd1f57d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e8490edcecf8c942b2103f43d4531eb
SHA1a2fed490651f83b7c69a9da62e2854aa7f898051
SHA2565da9cdaf75244312cd70939a8018a1f6fbcdb852e6bbe616d9fefc87a7f4e09e
SHA5125b1f86efe20f348484bc3964d2ff65608d46901e7f70bb5d90b808a82113f51733da95f5f913dd91cf042325bf20bb14556a2b959915e9e9e9c057ac22714ce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56668a43979236daf4966ac401e114c12
SHA16cfaa137b4edc1c293a0ed1b99ab76644e9d5818
SHA256d793b804956bd86bc2f7cac403e0b19f064ab55628225ec4597e8a5d6264d333
SHA5123475e211f6c807b9fdaae8e55cd967be6d48ed02f66a8028f365d702d31c7c8c4e9d0ef4a56cf125e9491af7b5a62f79fc1999ad06b079022b97e1a45d5cab14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59225cfe4b4cb8e7018fa0ec13ed10862
SHA1e343e3672ea8fdb0c50d52cc694e4988ed698f29
SHA25690d975fc4ff848bae0323ae942ca0fd00f68f3220a6a243f83d9114dedc1a2bf
SHA512a5e0f823c19d99b68f2ac325fb3111e18e4b9d218310d5cef116af63ff58108e24b8bf763040c2b6c1093e62fe4a6273e43bf0f14f86958d1f2dfb0d9552c6ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f5b21a7dea047e86242d91a6ad1b066
SHA185d9cd71ef420fab07a39b03b0dde82b3ad66965
SHA256c40c3bd5de7cc5fe71fd94c5aaaac24a9aa8ee85fa85394f5a55e66ac3c79df4
SHA512235f00e745ab99e2950e92ac125e36a191fd9454a965a34d8ef9c2787919bd397bba1c3035f5719e499375e2497c09ef31653f3f2743430c89cf122428deb2cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe649bbbe22016e321e0dc43c8d2800b
SHA107a1384e9f79eff0d50c5d4b4c1d334be722ea81
SHA256b003a4f186447924461df1877f3426eaf40f6c5a24567114bb1198b35286619c
SHA5127af44cb3e68b4aa7f711471c8eb6aa3fe0f211ac481104e20949802b2749d71da5391907485a7141eebe4208aef5dc32fe7f3ff61486a22a9f918acb001c4308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7904260084e01c37d82feeac52fae97
SHA1f9916a472c6e5b3c10b1b044a6165201388ac327
SHA256f760634ffb8bc5123d92570089396f0424de9e77a7c1ff5462d41ef1808a78ac
SHA51277741f0f35b4b5b2a65e47f675d85a8755b295fbd0519e858175929de57ab3b51cab33df69588ee8972168abd9c334139ccf92b939b4fba0835b2a912c4ce991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1c1d0087e09f238860d1d70b13b98c6
SHA146be2882e27d4c1e4c16f47e03ec86f3902711a7
SHA25698a09a5f88cb83f929cef21dabe6121d9b3cb59c86408af1ddc91ebfe356eea7
SHA512fd6cbd4f71d4b25448621834ae8ed5d4cd250d05b317c1be1cf1b0af955e07f4a0d52b268f21698439de914b1ba26f45252b7b1a56ecbfef5e364695e1da48c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbb06e4f9edd2eb9e6cf0453e6a69110
SHA1af5b3bfef010f3bfe259391ed8da49a677a2fdcc
SHA256f3d1b5a1f8dd11a86a1e8bec8afc88e36deb04fe6518390e87058f01578f2544
SHA512ab0656a70914f903d85fd45f2b6c85a669a187699b04b0c068b4adf24539fa484e24a5b21597dbc919eef786056f382044af2b3b7fd9b645181ed202ac943456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f6af6536c1d9affa3e0d82e6efe4331
SHA160edfd2a2d033f977a39086c3be7b5f54df57141
SHA256d6aea8876a02a9ca83b72adf2812e539b0d464d1fc757c2d259992d038321b0c
SHA512263eed912dff4b14dc1fe3c275e34f6323bbc8829dd38313f29ea1cb64eaf5e71998cb7e1788df863b1eb3b64d90793d292a868db82a621e4e7c980300b2785b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5749bc7465724d5a477e8b89926c40644
SHA112ece83ff0d0d2d9a69de9383249438c8992205f
SHA25648d1b48e1439dc0e2c458966b4236f280ac850f8159905b2f77afcfd59f78489
SHA51296ebb608e95598a84c909565df11e9d2b247f146cd10c48820a9dd526b0f68689519560a6f7727445bf87c23caf50b858e90c213ff2cb7cfed277e1b70cf4d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe2e04340f4e1240871e02d4a6af2ade
SHA116add78d67d2fe5a9b41140323df42f7ca5d9c33
SHA256b5e3f3cb3a7b2813134ae1f33718c6e650d65d8964995a8ffa4739efbaa3413a
SHA5122b2b18db978726dedf25533a1b7d5acf6448cf1cbaac89e1dbdb2da845f8806355bd5446e64519cb47eea0de5b4d95922fde9de3d531d97ed5b9286f63ae23f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0191ed6018ebc876a23a7554036dc6c
SHA17b678f340102546ea1ce729d448d1c8756ea1d62
SHA256f3832fe2bc4283072b6b74d13b5a83a16da5dd3780b13ea09b6e31d1ad08e955
SHA51267d87631403d9d5e66df4a8499ec7c48b08da99a991c0f8fcdc02d80aa33bf6747741424a4c7ea7403a6680f6303ebd864f4e199158a9afb62cec8599d7a15f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a095e5a2cd5f6c6971301581a05d3f3
SHA135c57bc13303381acb84fddf80ee18ceb2425f81
SHA256e1ada1693114cfd56b7ef09d3bd8fae35a26ffd0fd0c637294c395aca80dec04
SHA512db6dd6cdb742193ec54177675e4913a7f684b76b57a46f282adebee2c4e5deaa273200979db5a7df720fa1c10355d1ecd7747acd0ac33affa742c03084e19145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfc5c2f0f5c6d6875bb99147afbe4df2
SHA176d9f0aaa52eb087130487342c61e50bad6dc8f3
SHA2562de0004f04b725498f90edebebf8b7c489f8812536ef700a706cfbb7a38e5539
SHA51214337468d7d3fcb4854a12342dfe1131555a7e03fa3c62243b8619955345cde29f9cc40c5aab6574d02df47189dd507425a83340b508d4ae670d1e10663fc6b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b95b04ea1667374c197ce9ec49700e85
SHA199bd851480e88347a09c246122dd37b4ff4f34cb
SHA256f68520a457c05e90315a2bee5fb05836ed20c26cbb231ee0ed3a4a676a91dede
SHA512ac1058a08c220f1c678bd7a5ee612aa1c32b2b17a7e1de870b07470837ab503f26e4c873325c969634edb39b88b81688986d2658483e4760bc4c1ac8a24e2025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef50dec1b2ba79cfa12fc0242fa412c8
SHA14b1be67fbaf22641eb8d3437c058f50c9f3a5537
SHA2561f6557e3c5fe06dc6177280d87ae1cb24cab6cbf4623dc4c24fb51b887a4b75a
SHA5124cccee4fc6e72c121498d62e44b1753bdf36ba4d975d8f6d77a2dae0cb5fce1e713db921aaebc4ee74835b48d300c7bf4e5338de92be01bd9af7c965c9d02f89
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b