Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 06:04
Static task
static1
Behavioral task
behavioral1
Sample
e1d88122f6696c833ad9c49451aabf37_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e1d88122f6696c833ad9c49451aabf37_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e1d88122f6696c833ad9c49451aabf37_JaffaCakes118.html
-
Size
460KB
-
MD5
e1d88122f6696c833ad9c49451aabf37
-
SHA1
147604c1598e5aa239cc03071c4fbee12421c26e
-
SHA256
d257a4acf4e68bb64e1dc1f8fa02628026f8ec5ed922a99f7ee8e9b473535180
-
SHA512
5e3ed0e819791c02726a4ca2d2875160254aa0eee0164afeeb9d39f826f76eb5c41146253097edf7e4ff705b2db594e2950d9b8aa72f0b57eb9b44d1e7a8468b
-
SSDEEP
6144:SLsMYod+X3oI+Y8tsMYod+X3oI+YqsMYod+X3oI+YLsMYod+X3oI+YQ:e5d+X3655d+X3+5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000005e00c8343033d0eef0774a64a1c24683eb81937e4e2ebda8f2fa0790ec1d219c000000000e80000000020000200000008ff6be6d5f843da5130c63124e2fd7d872c19f760bef68a1b3d8fe1c457c141590000000d2d360188f7d6d31755286ea7f542c3312987a8c38297efb9bc461aa167c8a1c22965a33b7b3ecdffce4325a9de68428c1d2bf5da49528a3975c801781f305696ffca77948fe51347d19d7d9321f8472e3cfcc02ae9d60e30a9196d3f7555977f4393f1fa0cdecf44ad5b7fae1be8a874af0888970651a619cb153d7f4206731832b0615c1fcb82161183cf0ac72971640000000eb96d59430b6de5c51d554b41b7e933b43aa2e43ef970042bf7fd6dbbac7bebf8f7666c4628305f31eaa0b82c37f2b3315a1c97c650c56c4d0997afdc980dc26 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0a1a8293507db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4F9A2191-7328-11EF-B467-D2C9064578DD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000001164244e95d0960e9ec322ed76dac13aa7a061be1b6f2c3fee0c025829d471db000000000e800000000200002000000032870c1e180a53b3b78fd49e3dfbb3da38d847ebb988bf1047c9b4ecf2e5630020000000bbdd5153e7b5556cb0ee89578f79eb2ed0632c00a4f99acb804997e0b41f295640000000aabe2d125f659cef1ee4239baa8483b8df7953f048bd4709e3bcc1f4dff9b944899ed92efae23ab63cb88e038e73aa7ef18c1b1a0bc0369e0271a19667017312 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432542112" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2568 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2568 iexplore.exe 2568 iexplore.exe 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2568 wrote to memory of 1704 2568 iexplore.exe 30 PID 2568 wrote to memory of 1704 2568 iexplore.exe 30 PID 2568 wrote to memory of 1704 2568 iexplore.exe 30 PID 2568 wrote to memory of 1704 2568 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e1d88122f6696c833ad9c49451aabf37_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2568 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f81174bf8d558e7abc2f6740691a3c9f
SHA1a58a2a7f4908c619fed2f8899daa3116ac9a47c2
SHA2568ba53bd894e712d9f9ac780039dc1033cd928e5c9ad8ebe3db086e40a6fd2850
SHA51253e17fa072e85b15dc39c9b4371189e896d9bbb8ca028f5f1346bf82dcfef671cf9a5e1d91cfd55c3eba64e82999b20d973a3674085e076ed6056a8e4db16135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e87681ce7ae0121738a5c1d3e26984f8
SHA1482b04372dc8157ce53e035c17076b959e12a3b6
SHA256d9c4585d7b0d5c5544559267426fd1246c7ef0ca982e8a20a727ad4acf2ce751
SHA512e6748626993af687a5cb081a6c2cc4a6378e9f0c9cc2b7b03f1acc25f53a902e61435fd977befcc21dd221e61e6f3eed233489344981188a2eb2457fe653b121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adb3ed009520524ff19ba8314aa7c451
SHA1228325441ca36209827df91d2e9dc3f6ccf2ae22
SHA256d1e772e5f3df301caae15ce4d4e0eb2edc26d79a4cbb272f63e814c15854b64e
SHA512be0c0e43695c4a5cd6e6db348a7deb4c3025d6fdbfd04f0941ee3914ba865567e3f2882db4856dd9494c23c167c72f67cadeb7e1adb790bbeed17e9a28a2f61a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537ea042ad873e47637b4f97ad368c941
SHA14213eadea26f3de50a1392092fdfb4262fd15c7d
SHA256b0b8e0055655db523b849a6f080ea57431b9d82e93a3410c2a9a92c349748fce
SHA512b642eff9f923ec3e77b93d9a46f0b512333d4ee009f6c85ae45221f2feb605514ae1bed658b697fda5f839579fea2910fe9d14f2f10666e3d3561d6ed81a28a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4e430039c9e88b195d37ea303454404
SHA13eac5f91a9da1320acfdd40b2f7c6d5aab2b7b82
SHA25603f49e2d5e1126769e13b4a74c4ac119a32eb295bd6466b2981506c13c5cba61
SHA512bac5f471f42f61a3ccb90f160ac857f4eff57dd2bf42268181545da90198b42d7d3255072c9118f0fdf06f4590ed2ce582f8f9eb79c3b23f8355a0f9b46c1921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50edd6ac5c2d51ee5b36c4cc0829d8e2f
SHA165231b17d733bafa9e13d6f89b153803e9e07038
SHA2568a46420172b3fb3ccf820f7ab7e42df41b8837ecc5072ce5679e551e994dce4a
SHA512e05edd8a39829eb041204368d6abe937143aa5fca7fd5a6a7176f966f6fb9ff12791c3744ad679396178a281999ab088f8a152e1352f8f2c37081fbe0b58f970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51db4e1db7259669c8c29f69fadee5729
SHA1a087dc54a6a6112638f003f2a1240caa80d8c182
SHA256558fbe2c22fc2cb7ba84bf14113ecb1a7c645725efab132a6a1d122eca6df9c6
SHA5124bc97bc099ba4ab5948aa602dab209afaae0c6a72c39b134f3e0efa20823472f924a12a5e2fedbc4dbf6af5d2cb73b97d2b54ef34c3bd1782c774f5c0860376e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508d9577f27670cff68845bd320d5d27d
SHA19b952d1a2d8e73defe026b371a16f73b4c94e48d
SHA256c5e7dfa997e477206aa275b1ac56a772fe32f2716b47f5d6d650adc9f38e364a
SHA512bfec909e3f7f7917ce2b21d9b093c39d96ae305f2b932bb1854cf833bdb0ecfc12a3fb99a57347fe305ce65728ae844b739a97f6cd41ec9fad55f13e9b89a20a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510aebb516cd10234444450269d9b2e2b
SHA148c3cadb2678f2bb041ac3a787fe81d52b005a19
SHA256d239edeaa35a694f87ce3dd1e2ef50c311c31de58430754aad8022716defa4a5
SHA512c25485f367a985c94750c8d7b5a668d238ca3e38d319262e39ca7456ca8a1d28dff6dc8ad86a441c45623dcccd83148898fa0a26cdd388047dcaf18844a24c7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0f02735259888449582f58a9d5a98f6
SHA1315bd95bbaa801802a2d340d0d6c19897aba3120
SHA256e5b7e6bf8fcdf4c926af457eff07312efd125562ed2ded0d9b41fa648689e940
SHA512e4c5f49ad10f3eb9a2f42236df1f31c97ae43f71d34a693aa088838f3477926a06c34a1316f89724ec2b82b282b1c0d72ef9b7a462d0ce8ec646499371c898a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d7d5a55ec79667f0ddcb3228945c655
SHA1b55ffbefda77a7405bc148a35133236455aaf3b1
SHA256cc1511add20f512854b0687fb98d3c8a18e0df011039ccc5894430a5ca106363
SHA51275bf63230732acf6a3e1f0d14118ca14e2bae816bc7a81a70050eda28c7bc3997af96ae6dfa20445919398b45128cbb8726ae866ca3fd71806a6d465a512c15e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59815ea9d3517878de77050ada4d9cd33
SHA12934cdc03c7bed343c4f9ee566a26bc9d3f1bc29
SHA256823c80d41ad2f2193281569f8a0594147d680230215853b1e36750fcc01ab631
SHA512d8e38187b6b89a2a316126460734d6dee782d4a4ce403c75483b14a8af8a8217148707cc3b32584a86d46a07fabb9e917830b2e277f9d54f4a75691cf0153fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5853af097663ad58617d5558ac84cad2c
SHA1df69cb52e6ecd31ee390b85ed432c720f63a9bf7
SHA25692b086c8ea35c962e41dd434e2452cfe994b9a2c0b4c0eeffa318c824436a205
SHA512520147a5b338998d1b57b3b6ea06133a8a5fe2217702d097b6b055f888a14ff707c0880a9e019c119c9b1e0694ffb51764f374836ac93ea6440c6a142fedb4e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae596b3833ef2cc9f3730a8c1f51c835
SHA179c47d996c0c5afe80df75e86ee6cb17ce02fb59
SHA256a8b2277aea33744863dc8902780afeccf6ebc33933b027e96de378c3165945af
SHA5120abb9d9248b77d58ea65997774fababa641ebebe2b307ab2e2a08fa3e1a52b9278ca277f4db66fe58dbaf9d4e5a146aaeb2e4fe62635b8e51dc75ea7af8a4702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e3fdd4664b81727f4e51f7d09da2928
SHA1a11d498403ba54cb0846391a4ad2f65b55df6e4f
SHA256046f096079d72dd7cd7e7100cea5659a1f30a1f7348042c9d8d4578db1d5194d
SHA512743348428cdc306c4f36b37f8e910e9dc9f777a18cc0ce817be9f06c49af59af6d1646febd08f1ef85590a76c426343bbceb702d4dc2af96907ed29c2ce9c641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b3d8e081c9940038af269da767228a6
SHA122d373716a9d39cbf2527968fc2d76ba7c006c0d
SHA256d427128795ea7f4d6c8b3604e565824281d17fd3bc0759c02d52dbd70754c56b
SHA512a2c2d341ff79c80ad768026858da6f9b419461eca73c44c3274cd59ab188ca5dda6055bbde1d7c76b2f9d4294654ecc5f9827e9fc5f445fa828be078733348ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cdaad31f2a4e8d55ce39616c223fd77
SHA156954afb5c5f0c9b6f52f78c9babc2cec24ebb70
SHA25648c766c15b7abcf0017a4ca9a394291bc690a49bfe4e8f5dd2553582d0248311
SHA5122dc19379fd07d07491ca3e44d6cc366994288c645a3b8f430191dccd4029dc3181921805c5a1972f130f63e55b45b883bfcf402810815a61da3c00c5bd4b89e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579970f5d047ba667078f6f7eb5a3aa54
SHA1f5549bc65fd4991432bc26cafa8aff775e3abbbc
SHA25661dc70ff439d1a30f8d2daf03ed3e3fd87ee141143e7ee37c6aff1602ea9f43a
SHA512dd84138c7020ed1a73c912fb379739d3c4f4212f1a1ed4dab2ef2229c7cc75af62e1dd1059528e81481fc44a5d47f8c0252fd4ab5f4d3946dec8d09de1e492c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8fe6e2274861e4ed26f2f0a3a6df804
SHA1a140feab0f208af583c0139bf7703f1cddcc0a84
SHA2563642d6f1fb623d7f6098c3990994ead838d234e4b7a4574e15af20e1dd48468a
SHA5126f2427c482d88fa00a319df29cd39f865761cd3e5e663322fd715794fc17ed1c6959e46f70174ca63a4b0ee9763f3b8dc1773893cc5cdf63a16258f727a3889c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b