Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 21:01
Static task
static1
Behavioral task
behavioral1
Sample
c1931cef41c082ff832dc49631fd4d58_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c1931cef41c082ff832dc49631fd4d58_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c1931cef41c082ff832dc49631fd4d58_JaffaCakes118.html
-
Size
225KB
-
MD5
c1931cef41c082ff832dc49631fd4d58
-
SHA1
b249dc9f51b0c8ef6bad69d709d54258ca0db51f
-
SHA256
02ce9e825feb9f83322e1e93769e3c8801de72500cda8f9316315bd9f4b0fdca
-
SHA512
530077b747ac6b02cbeca8daab957e1735045530ed2ebca0260c7f98d2e3d5ca9ce561196d709a73a1d52b60e0bf8a3ff197cc1a7d4ac7c354c2adab7271ef13
-
SSDEEP
3072:SIjyfkMY+BES09JXAnyrZalI+YuyfkMY+BES09JXAnyrZalI+YQ:SIGsMYod+X3oI+YLsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a05412f831f7da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430781532" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{238B24E1-6325-11EF-BCF9-7EBFE1D0DDB4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000025a5e0c4422907ac41b3fb0ca0e91c1bee503509f6d474d7c3ebe73870a6c42e000000000e8000000002000020000000f298f5935bc5d70207cffc9a6d52f91bcdc2e626c39c01d94b9d614166e0918220000000b9e8dd37d3729cfb4d8a23d0cce7cb042fd4f9286780551299b3c29c6a1d6cd740000000bed1ee8839afbba1edaa3c78a0695f5271cd013492e280486617d28ba8dd0c05256d43a559c1af0546d766cea550fc091ed4db97e6323a52367e70bc2444b6fe iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2672 iexplore.exe 2672 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2680 2672 iexplore.exe 31 PID 2672 wrote to memory of 2680 2672 iexplore.exe 31 PID 2672 wrote to memory of 2680 2672 iexplore.exe 31 PID 2672 wrote to memory of 2680 2672 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c1931cef41c082ff832dc49631fd4d58_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f431c8ac4365f5616fa8aa42e18ec57f
SHA15e575b8282632d8a8fbaf6b212d0c6f84025ff7e
SHA256d63476cae912ee718cd88ee36ccd27d1b7cd73f212236f1a180965e00f81283a
SHA512d2f415bff8fd3301604bf8d7f5f043439c73f0401814cc89f0642e0086153e168a9a3d87a6a2b172c2a9eee25a983b97d5c26b600589418491e56fc43bed2890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a93ad1a2c887bc94ad62821f331bb6a
SHA113080d95d4877096342f681c7d9ad2c74a90d7cf
SHA256fdafd507860e472bdf1b70811f5bdf932aa7871ef0410ab8e3c736dfc6e0dc60
SHA5123701c9768adb01cc2074da1daa0c17468e087beeb0d320db4e1b8b6e86b89bf4378d8730ba527c7873e722e886386ede2bd74f1d9086ebca238c1d4e5dae36f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b215eaaa312a2ca4b9b29ffd76c29bf
SHA198b50e142a13ae3b754a2a5b6aefc6c398d42a90
SHA25650b4ec5de06a670705818b42ca9c2c42b5ff8470fab44bd0b10271f062fc72cc
SHA512c19ec652112d1540ce790e0efad51911ea67bfce017fdfa13c867aa78fe68a2ff9a41cdf630065859c351c2804494ecc1603598c9ebb024ead4bb83cc945192e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da1d8d0c1a32e002636b78447e1f44eb
SHA1d7c04f6e08f394d70a27b62e1b813921e9ea5803
SHA2569717866ee01c5f3be4add0b734c38ef48f6b03f8382329b023f5f18b78e92db3
SHA51258919706b6cfb2b197f844f9f4a6ff6737b44d6473e0eb64791d3fce37b680775c0172a7458b066f1b212d00c686ab13be748254569041c923ce8d6711e63a4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531ddc2f57c28a17fd145b3e69f71b570
SHA1e59d19e3ddc1fb32fc95809311bff7b3e086dc59
SHA256cccfd0ce88cb53d310251fcd4522ee309486acb20d4f86d862b266a53263cb00
SHA512e4faa74d319dcac6cdfaf422ec54e75cfa6cdcb0b057c51826d7fb351ebb850c2020ede6f4296cc1a2bced6b7b89f35d5c463064696ba8209118d6feb013878a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526101d45499b5b7fdb2fdf64c2adf700
SHA1c58f0834ae5ab9faf064e5dbe8e568a8000e2d30
SHA25698121d6776a9f38ff9e6ab0ab45fe962202ea87c392309352cbc68a36142a0e0
SHA512f2701da115a986b110ee83369ca674a04337b1e308afc3722d9ada396d6e3782b3a97179fec70084ed086f6552232d5afe101ad270c69706872fe1665d32efe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e4ae430cef7cd96aa8d9d4486f8f5d6
SHA114552137748febbc60284e9663d8cbea850da556
SHA2564f15c9b6c85890ca1cf8b67601375bb1bc255aaf63eac465812e6347bd543207
SHA512e60ae542ed902c08bf5f87cfa353cc3b244db4faad95ebaae9f721215843ef281429f960ae2253ff67f16f2f45527547e9af38c6149027b391f10fe520955ae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df40ede6d877ea3b5ba4d9cd65796691
SHA1e563fb7f5b3be2551a325d9754b0af4eb753c28f
SHA25651f8b044cce3a03554ce4c72b86081595e74fe9d62c94a6068dcc633f93e4df8
SHA5127ef8c578cf3cc4be97b10d14e7d7e67a19335220ef525d1463fa07e93fb82026a14a2094c684ab7356950aefbf794b8782f3f42d05ae591cab786dd29978580f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51593768663a3b102336b7ec85574d755
SHA1e849c9cd36cf047149810928f18dd702516b9fd9
SHA2564d18665d6bed1d00af4515418ffa8ecb5ba4492e3a3a74b5cb699ecaf8454eea
SHA512508ddc3bab532396e80ba2d180a72a433dfe03bbd8326e03dab1be849fec5d61c6938b502b5f3eb2e7158d96df8ff36e140b5ced5c9d313f51d42d94ddb3509e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e12b43855947261d42b4a05fbee6df9
SHA1a2a32f62ed44fd8f0c3f31fc64f01a570d08c227
SHA2567077b06481f51d38ace09f1fc42e2687d413751807f5448a511552a031d72684
SHA5120df733871046b6471922fe7f45e401698a7808d9fa55928351fb5aaa4a7c1d2b6b2a5dbef1e4003dfa848386677ebddc5b78ab034aa215d2290b95a73cb3af5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557e9bb2beb5477ff40580552c7430aba
SHA1472584a1f34172c89e003cc65518b9dd16244d05
SHA2563ca90885f2abc9661de524487dc86d5c821d7552a11512c28160099fd7f1a44d
SHA5126bbbe2d536ffed48880e0c06f362152412835f80422d02ba1f6bb0d5032b8bf4f8b474b19c1887ba2154040a46461a664c66b255106ac26e0883d66e332c0ceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558d5d573eaefca213dbc617b740bc99a
SHA1e13ffbb3e5b72fd1b450e22f0a3170f4a77027ba
SHA2563f75cb68fc478d5ab628867c56d5bb2057f3f2a268a1b42cf28815fcf62a8ad2
SHA512cf7aab71c693dc16107640e5e38157b3696d2594865782d005f87c09ee31b38c29fd9e0e5ca0d275c2b93e1fff54529a5f506105b99c9be1c3603b75623e4961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e1636e5374e6745adb68c156cf9d762
SHA11af410c21c16cf771fa53380af4951c3e1eec3fb
SHA256ce65d65fb4a1725068714d5085124cae75c5c0c759d17bc74a52545941590424
SHA5120e9936b1affef782ed869ececfdda6bc8b9509d7eaf19b1dd2a0a07e60dbf0ebb1338a1b9b8c032854da3f92f2fad860b16170decca461f4399f957cda4509af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54da9ab411a4ede8c5a7d78abfebab5cc
SHA1114699af02bb417cf94b847d5a5aa0a228cb18be
SHA25690afaf326d1222fc7b569fd29bce99163a2d0e1b9d0ecdcd750cae4a10b5a065
SHA512517e97a2aabb7b14873591810c2483f3a2952d536e9760ea076cd3497d10151ec2007f937b7b0406be87fd40cbf4bcbc93430cb6e58c7c505993ec74c860f082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0cc78b1b5dc169f197bca7d7fb1ead9
SHA1c183938f02496f41fee6ca8fc3c0534bdc2fafbf
SHA256fdb8b9734dbad7f16dd79aac6b973d52d2366d6dacd22caa5ff09c11032f60e0
SHA5120e3ef15b406f39836937f6c21ea194ba169ab31e39cf6841267e0268c7dcdae649c9359b933668a26e2d733e15282668b82fcb143a95ff59043ad4e209760f34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4f691c726d5eaad77a50af145b0a2b8
SHA193579825aaada593e228c07e99c94d576821e85e
SHA256efac45c1fc809fcf3b3e47d461b8785a41ff617bd43a3fc7b7d62df1d97855ad
SHA512731d62ad1441810343f6a7c57fbec0f2431473c8615e17b936ed84394561bb543fa1c0bbbb7f248433a115cbd1ab9f2ce979ee3365dd7f0e7e2f431b8bc237d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56df26a8dfe795eabbf1f917371eed7ee
SHA1848815d8cd2e034f917bc3c3414beb229369fd18
SHA2563f1d005b42a6605e2018b93ee724fc8f545fd263b5aa11bd7425708ae3e1ff49
SHA512a1962ab7a35f45c80ab1ad6b9b0808214142b051941e1b7b77091179ec8ee2005604edee7d3b593dc418fba7f716a1cf869c029bafa47c4e9708d609bf335ab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1c2dd254ef35a10d015d06af2b95081
SHA174b30eea7753ab7ed82982beb17b907dc10cf9de
SHA25624b39a6a06de32e98ff34ab2c7b30106ae27b4367f54f9ebf2b4b8d870f4e0e9
SHA51272799a88349965e32f296ee06ebad2345a6432e73db47e8d3f18b8ad9e5a0fcbeb52edda9e8dcf92c053832e869b7e1b7abaa713d126cca960ec2955152ae615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582fea52bb173dfa7d68df6704fae54cd
SHA1b9f7e91cf075438214246ed1cf63e9b8ff1626a8
SHA25644da9f6950b25253ee4951f23e9ee0532bd302b11f320f93f922fd6e7de5b4a2
SHA512390ebabdb91343a42b60e99daad69ea29cf2f85b42b855d67d492497b1fe32c2f6d9510400dc5b1ce69993d122aa4d3b3d6d5d38db62ae4c1c032a8af6f60e86
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b