Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 19:15
Static task
static1
Behavioral task
behavioral1
Sample
d0476827087bcb0544936f8f1e432fa0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0476827087bcb0544936f8f1e432fa0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d0476827087bcb0544936f8f1e432fa0_JaffaCakes118.html
-
Size
18KB
-
MD5
d0476827087bcb0544936f8f1e432fa0
-
SHA1
32c5352a93c66a30a36c2d814167e3116d021654
-
SHA256
4fa846bd186bb62617ca5d4fd91d2645e756eb2c35bda76cd2a0895ed626e300
-
SHA512
a874be91bc16abec7207b0e4d9c41592ec7aadddca5ea369f9179dab664ee479a31e8abef0ab32a2cf9b99610a1ef379f762fb31934a9447c2b51b96385ea607
-
SSDEEP
384:uyNhxKHqhPn3QWvGa95cS3qwqQS40tNCwPky8FmYnfmA9JEWSFJ:Xh0KhPgsGa95cS3qwqQSbNCwJDDFJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000e32520abb2a91f7eafc62e25eb5e3081ab822f5e4e1c28aa4b08ed69cf4a24c0000000000e80000000020000200000006c7b5f071956954d5a51427df1ad4db1ddbdeb204c4fcd883b976761af49f61120000000cad4d530e218c83e20b4c8a6c3604efc02bb0b8197ef6dab6a12e80157082379400000003d026110c0b9b7b4db101cd76c1ee9535b7bdefde5aa4c5d2d4ba74867b62c179d5105fb1deb53f44d981584599c46c9bc52d34616eff3cbeedd307f184c478e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{58B887D1-6C84-11EF-9704-E62D5E492327} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0bcf72d9100db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431811984" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1428 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1428 iexplore.exe 1428 iexplore.exe 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1428 wrote to memory of 2188 1428 iexplore.exe 30 PID 1428 wrote to memory of 2188 1428 iexplore.exe 30 PID 1428 wrote to memory of 2188 1428 iexplore.exe 30 PID 1428 wrote to memory of 2188 1428 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d0476827087bcb0544936f8f1e432fa0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1428 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d49dff3cd522b7d152e5dba6b7807960
SHA183b29d66cc7a210fd02ac0418c915948ed440d21
SHA2561bd9dd502fab2d2aa5e1b5c32f269ddfaa12df921ab13475240050cdc8e01dde
SHA5126adef18a730c48afb0e5d4d28c782d72e8d50b2ac1da6256bc84e7dc49985af0a5d50dd9af81a0657bd362bf40171069ced467e5ab38672b69ff0733e23fd542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53666803dbc16707eeac6d0bde509f3f6
SHA14be0399351417f58c12be1a83630ef63d3fac7f0
SHA256b4da1a78f2837d8e972fac2978a4bdfca8eaf6eeaccd5d0fc022fb1ca29dcba6
SHA5126a181828aa16b1a2c0d697e6b3366834fbec06291bf526bc46dbff9f9eb64bf4544b1548ab3bc2d27d3ed903a80f61939d02bb58ed1cd27182c3f54eace9bccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb521f348abd55d81a30d774ce32094f
SHA181bfe33733808af61fc3ff0aeeb01e40c0c658b8
SHA256a4dde8d251b441e42bb450a6994372bcfdd788f56579877f0436cd4e6324cfa7
SHA51270bf021198d97ca580aae6cb23142a3051341601cf8ee1ec205a526919d2487628f5904f83063a651c835e30b6840d180382bce58aabf48b41ca6d6409dafbde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5ca9c7be7144637da23e5ae44491f85
SHA1d172149d00f1c87b28a975260d291ae6ebb0ef54
SHA2566fdae5f2286bc58d69334738dd5b05bfff308778d1cd13cbe897b1acd3a8cdd1
SHA512944a5b809dec5df1645d345e0e75faa752ff5a3134eb7eb197c852507c6755205f1487c08e3ebd4443352364e38a44c65a2fa615341dc5e03c470b45bb3de076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512a28b66f77d22788df5c801bacaafcb
SHA1c065bb1fe17b9f522b0908edc7bbc89cec3a3284
SHA2563c620fa9aa2fc8706101f0469f97724caf8e1986b843b6818c2ea5d948bff8ff
SHA512f791a98da49131f7543649b37fc5464769def0ca3645e2cd1c0a069edfceb3c3986774b9aef170262f2e56341856b1871a9de125e3be69aeaf8078ea5269d508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c076772218a079422967000ef800b459
SHA105a95063b9ca94f6356c35f15272715b027f8561
SHA2563f0ea7d82659a0b24294881b3d04cd98a771047d6f8c5cd6e060c7522102e746
SHA5123ac905bce4dfc1b9c9ab7e3a4d73c9451a456990118d9aa43ac940fd86fb648d630e1378e887122c59752d0450e25c40e37992091f5b8f71259e30addb9becf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d7678b8349a91841950c87cf9545b53
SHA17862b064dbad896f8cd8f69629c495a2cf2c4076
SHA2563f18bc0a3b5746d8e701048a98dc5754238c129b6ce3c8be450f6adb724c2674
SHA5127c858660c6db8ca4ffe81a74578af6df081cd340d8a66131104062a82b79fbc907a3b25d38086a07dd979e01641651d759447032539d136513bb162bd87537d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579804a600a239dc51d03d9affdb5b591
SHA17cb16fdefa34914bf5d8edad8303bfe7e2d70337
SHA256b7633554a9261f4768af42e90e2585c474af5f63c3f1c82a4d232caee171294f
SHA512115e9364611603dd168a5c391649e6062116a3ac02d597b01895bf87e7d0391a80b1d16899fde72ee906b85c9f1d934b44c9a447567e2401f73a02dc4e93f760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532212e864a09ba9e2e938a54d4e46839
SHA1b1086bea6c64830133c210852aca65eb94f0407c
SHA2564c3977443b10e992266353a9d2e9310aab97454920db2675cc3787c3dc3d0c99
SHA51205b4ea91b85086fab7c16757bd73ca75970881976d6e0b558d8d78ed02c89981934f2562dee84ca253ef82dd71908572a076dd116565eb5808a7d7857c66af98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52633a8a32d6337a56bd19b102855ff44
SHA1b87646e8580881198ee00ee1b6c51cb44a514fef
SHA2563b3575f78d70ee883890ee44dc185c21f8573e2a5d9f5cc21140cd2ac1b7864a
SHA5120d3434b3f136d24b38dabe9c21a73355db23acbf7ab57d86f39aff8bcf0cd3aef36be032b3c2e11460f4e61641fa63241484d65a621ca496fe472a0cf8243cd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508904236b136a129742806e7416cefbc
SHA16ed9914e97fec8e2ecb28ca4200ae07f02372c36
SHA256b39c57372c9117abb5426af0e557dbd4d5db891af770b49f1f6106038baf8aa2
SHA5126cccc9760b9304e6085afb557fd704726dd0fc4e7ed971a64ff36b361966a17e891d07fbc66a0fc18dda92e0c6eee9b4bedeb20520cd7d10ade3ead3051272fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1e62880d7db96095f34107afb827662
SHA11c12088fe7e245b12d7147442375974ab56c2d3c
SHA256628963d0230e7a822a04d2986ebf4415c5ccf33e40af1f479e6837c3d58d6bab
SHA512cdf56be20b2b30c0fe84f2b1956c0f0c939a4c8dc65d76ec8395ce608c5ff726468b7b4aa1c6ce719258fd239e31cbfeaf48a449b8d740d91759defe183e7016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb45a47dbde2b2f1fcadc4b58ff7dd8
SHA1dc689b28906eed75eaa161f36cea86e65c932632
SHA256e307816bd115067f645bafeb76562c18849755d65b70b0eee3486f30e21f4bfb
SHA5121859331d10b3240338f382ddb0c064253eaa03499f3f7c42c610d9d91ec81a0d9760772f7bd7e17c7d0eadcf844cda50658b839ae8bb1f58fff69f13b3f0cfb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5642742f69657e533d3bd49bee5d27ec2
SHA1f48f6b2a69d0232702ab468265503b641b94e895
SHA2567b73c09388d4f130ef598237e7e5ef2d0115a3d2f50596335640acea6480b6e6
SHA512000879ceb9e337dd96fc577cf88b8d9eba3f5615b986eff524ef6aae842e1a7a4dddeb0c2fc14ea542476f50c547c9c841688956dbf75a420967aa6ab3f6d777
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cbab6584cf1c108819ce774e293b328
SHA13cd7daadd90acabf17643b30dc4887f7e14364de
SHA256a4f37ac5e73e38701a3fb45a3a91ac93e9afab4ee063262dd1e65d932acf091f
SHA512647b6cf8fdc104e2e645b9263f034cb809d0bbc2b88731e8cd6b2f6e7b55b271426aa1e3b66b7c291aca3b7aed6b3804b8876cc41714de9cb97ede89ac54b15a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541e6c44255cfc7842a33b631641315aa
SHA16ac522d199505cefe1bb09c5d1d27c633c247f46
SHA256e51da6232f760e5ecd8c9c3bb39e76f378d298cf757b85ecf8a0ab39c91ca9ee
SHA5129f1f38ae12fefd892817edd2d18f23526575d53f40ba6eb8ed8318b05f425b0822391dd8a3b797c101ff9140b7a45f67febc2e9aee8a833960d4dd7db3e53aa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585cc3669122cdf80217c187cc04264c7
SHA1bd35b18dfee3acd51097ec50fa159112b2429e64
SHA25638161f31f00d9f4df31d418962fd812da15fc961fe6a76a4c0de897a156e59a4
SHA512624da2687a201f8984a975ee9747d3f303a6b405006646748c5982bc278647ab6ffcdc62af13383164bbb4ddeaf84b3f07f9f950eb316019731d9a6cd241704c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d984a7904e3b8ab615824e0be42b2d65
SHA191a6893d203e02a2360ba5734d15229f596a186d
SHA25685e0a3c3dae44a55653f3d07fa7f11e1e1fbe2beed1cdb4d1f5035a5642c98a7
SHA512fd8fb685dd39c379e289697132b1b1781330ed2f40dd9bf79d1bd5c65de97446a2fd550c6622e97445e3ec12a26908cbd0ed88fd36c9115d760fd1688c91e05e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bef630c202a8f2283624a01a5be3a20a
SHA100ce61a1db7b9c2ac09de4bc440bd991a667347a
SHA256d8c76f8a1ddf2a9480a226b73492448548692d29b359c4910ea40ee403b7210a
SHA512d8ea09940b9aff293bd379d05d300b54ddb2398e00f8d3af1db8a3b453d77a8c8fd5ba910b82d0d39536de0684290e0ce1fbca937d30013dddc30dacb9c3ad39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cd2499b757465e64476a5a42b2dfbbc
SHA1967330d5f2724063a156756b3f56c4fb5cc9b8df
SHA2567073c0cd46dff934265b611067c0b6152fdbe74e0c345c355d555f4bd5e5b0a2
SHA5120944a15bf57dfe7c80f54c26ce2087ac9ede01ef5bb02e9b5a86fc844a9ef5882e502060d41b8f01a4bb37b45eb701041ede3008c4e8870adc8102807d165468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ea88f7a13db97a830b3af6a6c0c8351
SHA19926a4b3289d0c7d7eba27a5fd1aa59e9be327cc
SHA25605719919b684bb6cdbf4a3d6a4ead52e380d6064ce58d89bfba1b4cd743c8eb3
SHA51274d082ad1603fec43ccd65438efa06dca463041614bb0b1487a544d5b9ecb793703649ce70237c566eca93cc3e6a46c46d891bd99416ed64cc2a62de52304b5e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b