Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 00:05
Static task
static1
Behavioral task
behavioral1
Sample
c1de9e27ffc1da21c3e0721ab6d5ce57_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c1de9e27ffc1da21c3e0721ab6d5ce57_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c1de9e27ffc1da21c3e0721ab6d5ce57_JaffaCakes118.html
-
Size
139KB
-
MD5
c1de9e27ffc1da21c3e0721ab6d5ce57
-
SHA1
2fb9e858ba9f7e5463dd68bb7cb88699d9b3ad69
-
SHA256
8cb4e8bdbb1c1ce287f1f5cc082b015029ac738845de7806bc809eb196a0ce4c
-
SHA512
89d9365f1fa6d7687f464f73f2c40ac8d234800fe7236d6101bc7b13a0c0121d6e823ad43d229d1ffab22a44de04dec827e8461d2d04b8160be0ac4a7e3da966
-
SSDEEP
1536:SUVqqVmFlyyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:SU4gm6yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FD36ADE1-633E-11EF-A533-F296DB73ED53} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000004533a79b1b4e741dfe43bda9c63d6eb7846aab45a862fbbb06a3cdcb3181a263000000000e8000000002000020000000d1055d6ed352e1e1f8a8e93bbae301559b03be9d10700e89e54b1099cd5cadf8900000007baf46f441214b63dec2f3e74545bc0169f13bf9246aec1c599a16382f0f8c900e99e2b7afa0d0e449d42ad1a2608eaea42c7afc68782e8abf25f48f2f85a5b20a54c3cfc72f412a9b8ce55bd4b31f1c86f43517fcddd2edf9e87377a5c8a970c91b7b9f42de85c8d7ba12b142fbc0340c205193c644ddf973c15a3ab916a48b11a999a96ec68b44e56c7f28b2b2dd3b4000000028dff43a0530748c8492c9cf678be3f141ceb88158bac36d06ea6840339b98925b2066126561588d89286fa2f3dfa6f3e929a362e182d84e27b5ca0a53c111ee iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000cca0bf32b491542fd2fd635da43b810dce26ab738543655d82efa8269a3d4703000000000e8000000002000020000000513bd228b87b4c87d1fd8c39e7bca5d12ded7e0c783b2d637817d53e181fc8ad200000003da96cb83630a55846e4ce8f01503c8d0e839c4c5337f3333465878db825f81e4000000028aad566b1b6861be7f459f761e272f96c688e0b164f9641e22f533f688daf34ed9f413a9b826d7e552c1b8e271aa92aba89d68603c11cc603cf14e439dfb6cb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5005e1d64bf7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430792639" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2748 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1980 iexplore.exe 1980 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1980 wrote to memory of 2748 1980 iexplore.exe 30 PID 1980 wrote to memory of 2748 1980 iexplore.exe 30 PID 1980 wrote to memory of 2748 1980 iexplore.exe 30 PID 1980 wrote to memory of 2748 1980 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c1de9e27ffc1da21c3e0721ab6d5ce57_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1980 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c36dbf7d803cf248611013e8f8ed06bf
SHA13085a69702b0dc2df0a0ada70d77d9240492b1f8
SHA256e3dd491ce0a5814f5ddff825b2dfd11dd4e39f2125d570128d6f10e611aaceee
SHA512026999c6130d8b0e728dc2db4103ec74d74a03de06d556444523b84822170bc732cd6d1dd0c410570c1f2a8780451494a8af9282da37adaaa6346a79206eb1eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506dafe8769bc738ebd916b7872944178
SHA13e95215d4172d690eb6f869609e82abe4b38b55d
SHA256b4ef38e9dd381314e4d0b7a4aedac0691a791d400e17c8955ab9cff255d7879c
SHA512dbf9fd56ec491f8d8e34271ace787e88c91f2773dcdfbae5b131166363ba7d1368b23f6d96c0c66f5463307c60d8b9bb909da02b0d0fc63b39a4a71e79525dda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c40131282cd4001d54ab563da6e15534
SHA1737ead5e0ffc41b69dd1529742d0589c2a07d382
SHA2564ec4d53541fb95557557e447bb6933a568e6b5c5f83d31869c878d0e44a2a42a
SHA512d37dd859be0d3dfe4d5966959ae9516dfd8ead63b21af24c87e0c7a39d0ab1c96aa7538d83c8b36a03fd96c53b2339b9c0125a67010935708b383fb16ab246d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e86905563d0c07bcbca0ed3268021e7
SHA1762568585de32994ad5db495298813c78f449098
SHA256267d019aed51e02e51af736ec5abe4e69bb33ba4b1a00617660eb4224fcd42c4
SHA512895564d54466ea943ee767535efe9e51acd2775434ffdffa1d978a5481af66c1f23fc990adaab6e21ec5c2b53162a565bffd88e24547799fadba607c419cd07e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ebcc3869a7e84e1f24da5f373a776d0
SHA1ed3ee2810cebf3e9be57bbfd9440fd2e68f9f848
SHA2564b1f6b5528a9eb6c2500a4176167cb916f6b330829dbdd9d53774d5a190d32d6
SHA5125929a63c4715174a20f75aaa39d2b13eed49251ece2db1bf312311e726e310ff4b1ec07c7fb7616eadf3eb9506297e2d5cf4f5434f13a950dc32cf613e938ba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57655e30dda0e2a04608e8e3193cd2ac6
SHA17b7ddf1011174e92805644ce034c66767d382bfd
SHA2565be223f10840ea91fa3bc81a187939df1258c33cbd78bbdc17b19c536bc7d4b9
SHA5124c1920a2b52d88c3f0973c2a81d976b46e54e187eb34cd9a09b8d41da0982fd24f5668efbc5e521e25747571deca3f869139b1700de0662796e7be3518349a2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cadde1891ae68bf370f1f346855f4eb
SHA1bc156360e7191305bfac5ae128f626523c0465ac
SHA25631bd003015fd18bfcaf776e2d7dee7fbee51954a3892e9a6adde0d586f2c149f
SHA5123ab99791b2df4549969569d1c9e96d022669fff28a3b089aa4bd011b0d366e7bfaa39bed0583015e78e2a406427eeabfdbf5880345ec81f3c74e670f576addde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a092836ead99fb34b15996478e70fec3
SHA1637e361d27bfa9700cc462e96614a9e3f9b9d6b0
SHA256024d851069603af1e27dea9e17c9cb0a642b009fd7ee642f0cd4542601514cb7
SHA512927c8736fec7c261b6e9aa3b5b096de3f47df965f1344af95a9ecd6c5c5c93ba98161a2ebc8bf05050c4ca58c662d79556e0c1eb5a0547d03d84b6b00ceddb50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5bb5c45fccc97816e6801d4d2e4f048
SHA1e42c4ad74e6c793079d065466250ccf610c11d32
SHA2562f5f74b270c47ab68efe52b4a94cca3fa8907327ba704c11285fa7c3af57a1af
SHA512c263f649df3d90767395fe97592ca122ce1a3a49bd42fc18b4b10e4781bbef7dffac0e745fecd8f3acc916631b7d641f8326c6cc17e41fb0b3145b4f1a585f9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b51858859224401bc98fa55426d3f732
SHA14a84f0003e376e2f4bb97d23c71c6933036c1e33
SHA2566d3766fa425ed834806bca228d6d92cf963bdd9da697389b4ee620f71943099f
SHA5121d859955b3f5eefa990f97a001c7696161045c0cff3c1417a51e9de4e292856ef69556ba9bb55f9828a5f2368f9d17e2c82efa4fef14cd8151b6396791d06ff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffa7901e5e0979a16c4fedab957bfe07
SHA154a6c7b10217f00ae9ab71c5f4ac4b8241c31cf1
SHA25658980e03d408b0aafae98b5424a59c7cb51be0437df59b5bc49c06410b092e67
SHA512fd2d5aab12c57d268484a0b2104c2c7e3a3ec59dd128c4bab50ff82260e5dc6bbccee1d5b4b23787d21eff756d4abf486bb5ce23cae2d374c081a100e31a8b70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb691b5b205b97af77a3d6ef0f291c43
SHA116783746eb0274db25e78d284c939eae4a1656d3
SHA256f3265f05886ae4bf786293ecaab70a4f3153398ad72f53ecb7583ab48e7cff20
SHA512501fd86b841e7ab2e06c8317294d364161b795ee3c8385b753f3da92c20fcb229252c73d9ced488bbf3920c91c080719f8e73d40926efdbc58a530bb4f5967a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bf0fc3668dbcc71cb29679ec45088b2
SHA1b7e736316fc1f4460fe700e62d71e80c7314ddac
SHA25643f4523118b50847b87c667038888b6f9845e694f4454a0b5a16814b50b9d0bf
SHA512369bafe71204a65882871530102c06bae52b2f1f1037bc92259ac5c8abefc78c1d073abac7a4749ea74534bf486ff58dd6bf21f2381c5bd988123be214d901d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5217442d7ab323ff5c6f4d9a9fb38ff11
SHA1be1ee03b4530e95b4174bd1d6301904bf42d7ffc
SHA256fa1abd39f8e69c1db19df51a0ede0bbd8ac622842634d4cbe481353d50a220d3
SHA512c58837b8e988770c3cc7d6d2e554e5e8a3fcedb387bfcd27608662d271ce7b9b1fbbba345bea3764c0eea6e7f860c91a8a0ac4f9fe4c29226362b6f8caf12b95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d03fc7f2225d8972d1f129fbaf9c0e1
SHA13304094c06cf2ba0449adcbc3f8128d6a6873b95
SHA2569d4c8b2080c794e83eb6bfea5bbdb65562ab132ae9f8cb775911721f519f8f14
SHA5127e19e6f2c1a4af391dd62e89b8f4879e15fb9815ae0b24c08d628275660f158e7bcfeca282a3c91c2337dc5006157912fb83893b4aa2602018911cafa208be9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec18c50af91a7227f0b0ef44efe9bcfa
SHA13911194eaecf5bc74b50dd72fe96630c87dd52fd
SHA25626d296a5ee85f5eeb61d6d1f8b92fb91f5d371958e3ac5fbdc2d6fb8e582cf18
SHA512cdd2e17be4d1a93fb9b4c05c775a325df465e418b46f5a87eb1a27b9bd0688d3fd5e8e42bf05273aec372d6d5a833c11582d4a54d8698cf397bbe416e180ab3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5764b782e80e0a6e89cca2762d8736c96
SHA14483e31a1d752e8e51b9ad3aedf56b65adc0ee32
SHA256bfd92e89fc98f3ad63b56fa1b0715e874211a6a5f9b6497f6862b6184857383f
SHA51237a7b562fb2ebb9f6d1e62383d5297303280f4f59fe55ec2e62f1a8259e793246776a0088667569315c3b6668421250d2bcb8a98b17df8dc1a51cbc13cf12472
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b