Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 07:27
Static task
static1
Behavioral task
behavioral1
Sample
dfbcfccf37ac49c7b5a898a5b964146e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dfbcfccf37ac49c7b5a898a5b964146e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dfbcfccf37ac49c7b5a898a5b964146e_JaffaCakes118.html
-
Size
6KB
-
MD5
dfbcfccf37ac49c7b5a898a5b964146e
-
SHA1
248a970dcc320ee13f9fa35a4fbd672ddf9b6992
-
SHA256
5912db9edb3a1e526297b0d10927b71846e351f4a097c04c70ab9dccd56e0301
-
SHA512
c0c409b6f796d5b8f7753ccb4a41b784c35ef198b0c82e8c4cbec8b81e1faa9bd4f278288440b12a762dec2d315fb77281a22a039a7e2b2d9c6bca4f2f1623cb
-
SSDEEP
96:uzVs+ux7KWLLY1k9o84d12ef7CSTU9Ph3cEZ7ru7f:csz7KWAYS/e3b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D38A78B1-726A-11EF-82CE-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000003607b49bef02009027ee6e5344b1713390df914aece98f4ee3c1c5682183996e000000000e8000000002000020000000be2cde1d1c3b8b4c36a96cffe955040bbf64736125c892b86a3965f0c393ee0c2000000014048e2f6b160fb801fadc5aa3cbc4d13169ca82b6bee06937ad6bc2389f5bab4000000093555c81dbf69dbf430c3b3e39348d97458647357bfba91f4c5b6ce6b428390006bec55f25c0295e315f7908e2a6f9dab2a9793bfa77c4aeb527b6eea7120c6b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70fa21aa7706db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432460729" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2992 2980 iexplore.exe 30 PID 2980 wrote to memory of 2992 2980 iexplore.exe 30 PID 2980 wrote to memory of 2992 2980 iexplore.exe 30 PID 2980 wrote to memory of 2992 2980 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dfbcfccf37ac49c7b5a898a5b964146e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dac3964998dbd7cb979a68bace50371b
SHA166556ddd10dca5ca8e8f3dae99f7a09dad1fbbcf
SHA2566bfa2fad7c16bf3ca7c24eca2aac0d411c7cbf9c220a6f162f32f9233bae1ec2
SHA512f027b183103bbd0032011d4697335c2e2ee5f0257be85a22431bb337dbf48755867ffffc838541fb7055837229b953f4ed8e212ae5f73f6577ef0a564a8ef5c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5834c8238e938eb4dd26f575ef37c9dfd
SHA11569b86df054cdf6410d5fc3ffe5661062a03614
SHA256f73e100299cb197c6c57851ec99c72a0a1ed45efadcf22459613860cd7161dde
SHA5126502cf5ba78d79857d832fe0c036892e25618cf2b3d10bc4ed32a449992e4b6877f4848cd34ea16a903efc83b82c288a62060913b74172bb979582c2f7545100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58526c4f29ebba7af97a98744b69a5c26
SHA19d0f13842cfd82bcc4397733bcf59a5d7e1e1142
SHA2566b27fc804241d0a3bd8172c54c0eaf7a7d682ef1f2358821c010dd5978e852ff
SHA51215b9430c5122c6f04fa4d0c5e4d4a67db493e41f5fa0dce48d699fe9fc459b8f4436a4614e76021af0df5a691dc9c5c4d3bc26d0da91effd5cdcdb6661e60917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533370fe29ceb4ca0581b5a4c5454f56a
SHA17eaadc04120e1d6c4f683ae22bf40ea5dd32428c
SHA256fe4e8fb8c67820655500cb47afa8049296a5805defce7b3999d98c1574f82a3d
SHA5129419704c9ecdb7dccb21a5c568430599d6006d18bbbfa0a751acbe2b64ace340e401b8aa46a1e50c651d26f8b0418e3ae0e1eb1ff33d2350218a1e97c80e061c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d86000fdbf0e47a17c07841b5dbfd9f
SHA16e2f49114552df60f478ebdb60fcfd0600152abc
SHA256e1a68cb749408d0a3003ce6a9a63258a8de8cb9984d18ba77fd5b3dc8fc62eee
SHA51240a5e479b1325fde54e8e39847eaa770742320494f769fa6e8ffd3624034fc9983e65745277e9fc6eb13238dcf159efc6384e20b448749391b845fb532d551fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbdac3e7f99deb332c82d90369d168e4
SHA1ad384bf3efd236d9f80946f7752c6408f690cf3d
SHA256765be7e9776c6bcb8ab5031447f191f126b1249b79ba70c39326f8c58a6103e7
SHA51260fa374d22780f6484fc68e79b1584bb6085b79f945bcb8c3685ed9dcfecd47f9d7866d65949902d8b8ddd8aec74587342f2221e5628c284c59a4d3888446387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b37fd087fd3db6a6e58a9599bd71cd59
SHA1c9af53b64d9cc52eda8a5a1293712e76f5499d09
SHA2566d3cfee7311900ce56c8e658daf7f9a39a88da3ac07adf76c305470378830b97
SHA51242494c488648530c9368202533cac57badaef56c7ffaee03da50461be807abbf33fa014d8aa5ac5d9a897344593a4e108221967c22820d40873ef61bc06b2db1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596d7d3e8e55d7580f958f3726af7f9c2
SHA1ba8eae1b197bfe78f0a62246caae2f7d5add38b3
SHA2567a378a5031a89407e6bb05d0c5f4a972ed1678d8cac961d1171475f33e2f410a
SHA5126087f26483f34343a9df115f1ee958d0e7db70c02c56647e5370d48b6e4a19b8b48182d2f957fa965b48b23adeb4fec84b6d297dd0fb79f7c2d2d9ce480c1f8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d146434c9fcd7c9af6b1203d460d59d
SHA13a179605c988bac242412db225e2d9370f1deed5
SHA2562feabdce9829d21e427a941014adea1bf76df37fa9acbbb74fab3ceb65b9248b
SHA5129a2336c603684fbd31ebaa998b1049e4558245ab549b7a35a5fe34e6c643437deffecf2e3c0cf9c541a0bbd6208630e4725d150dc241b3ef987a3340f1a57101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3a0a22944fc190ef2b552c9e9f42b1c
SHA1f36014de112914de9f8ec19cdb30e86cb0571f36
SHA25600c3a719665accf996996ebad7abbc3fec71f3dc90e5f77353fc91cd7c25b407
SHA512a509231306988eccbd68563c7094b88ffae28a59ff4e4aa596686f97c2e03f4f8f325a1103ad29bf78de488ea91d65c42bac9b796b734f8d6861e7352c12e88f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5644de5d9c275e874e9e483a3fdbe86b2
SHA108c73fe256f383efb03a44527fd37d467ae9743a
SHA256c5ed680b567bdf21491141b675b16b9c67648e68f2422d4b093269f79983c52e
SHA512b4f21eeb923ae178a77569d30c88d8a5e1c7adb8117b82204f2b728e9693e746753641d708fdb12e6ed1e3dfaba1ed7775e4fe6240bf3a079100fd091264ec46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d01b2481713f002871172b8a2bc1bd13
SHA18320f385535c74caf6a9535cc185bfc63381640f
SHA2560d72ec903ae64b1fd58d9459978c985d5635f2a78852be703765a579ed0b5370
SHA512c2f5194e28eb74a4eff4394294a18336b33e49abcf5fb74bb140467fd401aeb8519b5addce5410ab68fb9e2bda2f8d13975e65e8aaed355f07e53b26008d0e64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0c54458a475d053b459c6daebe6b1df
SHA12397ca5c5d7975304a58d168c7dfc0f0da08d121
SHA256dd4e6e52515f41b15909c47d68f6d2f0fa2e9203ab8b56cb3927cedf1905f84f
SHA512380463f1177b5d40b428a658bede594960a9efe835eae05ce21601e65a676ef1ff45f2f51a212c7b2b2577c6923f12be40b0602e9b55caab024c2b213a161b5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ef19ba985cd50e3f19f4fdc7275fa67
SHA1250c116c3c9ccaf20c7be8baca12c28b726faf79
SHA256d882c4ac3a723657ebc8ff76669ac9f12219a83229bd4b805198fb52b12b19af
SHA51282e9d9ad0f573154f8e7c73957dabf38bd604957fc916b31ed65510f26f1824b63b9883683150967b8cebc05d9cf05bb17f1e252208f0f52b184022f358f79bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d16f80280dbacaa46d494912c15f4ba
SHA147a0c048e29944589b403947b7edda8b4748915a
SHA256bcbc6f3e7cdeec8f423cf25afe54f0f1d5bc34fd0106622bd8641e0ae405d6d0
SHA512800751730a521c967698f788cd7d06164f039f340711e3b16c877a456a90b69aad90306a3ccfcade9098ec040b02faf0d9c11b99e182e7569c4066d062e3e31a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5793521bbc27a8394a60cdee4e4b00d05
SHA1d22ab3c6ac9efc7112bde1fb3b0777c342413944
SHA256b5cc4c67bb5292dda418f3d2b8153414697e3ccf9a8031976cb963901016f97d
SHA5126e884d9dc462afc775d29880db0e94cd862dbbb5922dea793117a0b6ae4306a54167ca4b3daad465cdad21872fb196d1b541bc522be7c7f3d98990f904638a64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c2c023b48d9e913302e3a253045f059
SHA176643dacf2f957ecf69125d926b1b3aeb5b03c13
SHA256f752051abeb3db27af4c8a5902860ae2503788386be816e66ed53d57b2bdcd5b
SHA5127d9741f0e66b92f147a85f0e15c669a8df471f6578fac5944eda51a13f5948e08a4ba33463189098b48fd76c576f985eff301b02734d5dfcaa0c3310b191757c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5802774e3a1dcb8fcfe428ad1d8a7a9
SHA19a197038ad921efffb108a3683346a79173c8786
SHA2560fc08a80fb6d9dc3d3922d14d4f990e13de41d798c8003acb50b274a94827196
SHA512c845b3977e049d37add494525dffb71618a73a079642827d31e7a8719c47b78da878e226292740de85e6ca2a09050b67db087aeec56dcb10a8d9903d84b0dcce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5035e572ee4f772925660655a491ffd62
SHA1df0caf6346266f6d9975be22db08cbda1f406be0
SHA25695cb8a318b018fdf5d4a4b5c2b8e2c046f6d069479e69c885d5b01a81038bfb6
SHA512f3c073f55c779d1875b4e7ab4fc3a8242b527c7ae1d72ca82e1ddb46d1122c6d68aa6662c32c5d74766d63aaf81fb1fe6793c574001bb5a9f61ad5a1a24a845b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52702455c78609ca1c7d3d047ffe10b52
SHA153aae6b0d6df3c3859778e26b0234357be3e4edb
SHA256fbb8e63d77b8236d415f239c8cdc12da79599f3bb84916bac547caa478f0c6ce
SHA5122ae33f3ca95e24b3131634b61e609f40bfc64e901632ed17404318dbd02ece82d754aad5c0f2a71e39cfe6ea3bebe03adf27b12243e9ee376d0ef5b28f415983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f440179e3a614e6510487bcd15ed1dcf
SHA1a9bb115503b4a187989fb0881d5ce8fc2018edb9
SHA256a0fd4bd7062b6425c45efa66f0009f39249016b9b610262c5977e337dd3e23fe
SHA5128e46d1efd1f7ebf38f43539927dac093ee3a1ae091831faa32f50cb488354f47625eaf7ae86866e0a933579ff306f286ae6e8759ba305b3907ecfba7f436b5a6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b