Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 02:52
Static task
static1
Behavioral task
behavioral1
Sample
eef07b5791a21cc8dde8fd52601844cc_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eef07b5791a21cc8dde8fd52601844cc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eef07b5791a21cc8dde8fd52601844cc_JaffaCakes118.html
-
Size
15KB
-
MD5
eef07b5791a21cc8dde8fd52601844cc
-
SHA1
3edcb4ebdbb1b97646fbebd96b58c9021fe4be09
-
SHA256
83d5fd26e7d966618bc8ef7026cd332a04e54b9ea4c0b59a2919a5275dc2a4c1
-
SHA512
7d0d36549de57968db6f70dd47b11e1178343231c8cdc95ffe2609f1bfe1b5900296d98ca18a254790fdfc4c72ac4589a733360cfa69d60f07dd3e306485c48f
-
SSDEEP
384:CyiDMxPymuH/tYHyY7mFAi7zy1wXM/2Ugoj9c1gnfMYyN4GItm:CyiDMVymufiOAi7zIKMjs+fi4GIw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 004d0454d10bdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433048996" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000a779e54604b1e0980ccb3853ad0d6272b9ed6cc464357586356307cadcc26a44000000000e80000000020000200000005de80f847d7db2ef6319c8c29e486ca097983b9df21b8eeee42fbdd3fadbd66890000000d5db92b97fc56745b3c474113885cea814b151bd8e174dd665c357cd06f77602a777cedf8920dca530788ec84a8354528028dfc3372e2b0f4009c39b24b1389fd9093d21f49ef0bdd01e59d470ccf413b8fac4c3e79df8e6e7320bd66e0b60df61c38b4d368908d3a55b7d455e80d59d1f3e0eca2a5d5440fe59ea23a0e2df0006a7cb85b1d33b8ae50efb739ba5e79e4000000095720ade524f1e0f504dc620456fc774126be09b0f724fbcab395b6a3addbca64139255575f3e447d059ded56c254f4785e2ed4a288fa0acda8aea536abfbf48 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E9B3151-77C4-11EF-A429-7A64CBF9805C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000f5c1a9366b9e17ea07eb8062488f6d2922b44f97ef782d86f85b3022ae2f57cd000000000e800000000200002000000065af7be4f9a8bb5560f887b14f036331541d8381e05807c472fa94092b2a38bb200000009538b51d2e5a70ac64cc2f0c8d61a58e42847baf8aa3dc19f3e92311b9fa3ba740000000d88588044c0a34e0e40751a0677613fd15bbf32015bccd9355ac471d17c91351649d7083442561518a851eb04a36445557a038b5107dfab81dc57f2ad844e82f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1760 iexplore.exe 1760 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2788 1760 iexplore.exe 30 PID 1760 wrote to memory of 2788 1760 iexplore.exe 30 PID 1760 wrote to memory of 2788 1760 iexplore.exe 30 PID 1760 wrote to memory of 2788 1760 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eef07b5791a21cc8dde8fd52601844cc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf579ee43a0c38032217e6eead443639
SHA16745999efe3f9c5ed6b7213614198c41981fe8a2
SHA256d3f3cc7972e74049a72a2a83f6ae0d4485f540e4713091b637fe6d8ae235d97a
SHA5120e6efd1c88f7febaaa0700d3a24296efee5665a77f51c832d9a842f3d7088ba17ed428a16e2a48379d75a2c58456c504d9655f9393243223687eed8f20d13c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57738eb6d2b8b4ccfaa7e40a4285bd9e4
SHA19c948d2b08f99501b51145b0fe53236b148d5e62
SHA2562b8cfc9cf65d36bb59e7c0d96b09c04f7d0b29227986a93c1b49dc7189e57270
SHA512f97624a0bd2f90935f54c2f94a7c6d8d3398d438db1698d58b912f4b94f4dc728b9de63b1eb5628078f530cafc0c5f7eb259d19ad12d17240466e5fcf0fb009c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f515cc8e605a162ed6a4cc0ef29b0dee
SHA1ef55882bc06b4e5908f4a91faf2c104ee3ece24f
SHA256eda7401081b6358e0be6c4dfed53ef13053fc966872064c23ea4aeb6ecd2be6c
SHA51215134d6a4b2d8b387ca80a6fd78b2c789eb07d5caf2826589ad394667136c8bd9610cfbf14d1cf0bf32af069732e560e0c966bb5b8fedb27278c1dbe1270edf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d45a1c77bc51f50a6400da8caea60a9d
SHA12356157563f1e0186e4c6362d1d152ecff33b97a
SHA256dcea81e88037ce906b37bac05694cab4e4dc64bac54c367d4d44b38250d8fd8e
SHA512665287cec0519856cd0320b3cceb8ca90cf8ee2fe2617d8516cb5d004d524eaa6b81aa513dd2a85aa306d6071715cfbaf4e0a88206e6dbe4644f32c260fc2286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dada1e5de763c9856365ee5146c9b1e
SHA1fe5098a62d03039f3a6668ac162ba7f4a7649b19
SHA25614b19fd636e699b28e848316496cee7641493e2a0e982bff2ce6610bb1f93373
SHA512f5f887fa90679f074d92b2e7a19d83e5ad45bd4e1dec0514071ec456908b2de7a819a75c0c9065ba675d44095b6a68e6577720eaf47563a906a7dde3b5f8bb80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9cacbad85c3c0b509eed6e9b205f547
SHA1bdc967c25a9201d79f6037e296f746ab7bef10ad
SHA25675734909729e03b041417a6b2c0bfb03bb50afb35d428a8c1201edeafab0cb9b
SHA5122c0df7682b929f7429de24a1318ab433e1e6cb05b93b582a96add35c5a2a945ba114971c62671bc7d3bdcc659a814a5a6c0b5d7439b191ac371e75a710be43d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e51b1cbded606947e605bf7e1d18feb3
SHA16d4bb94cc502df81ff7aa8c044f9c18d2c9fa925
SHA2564a9b2a80126bfcd4fce0d15143e291fe4aab5a7d35f8806e5ddc494887566515
SHA51253b9b344ee0a80487d8be09c4c96ea320bba4597b8bb59af78010d39edaf4e85c689804d3ba012088735eb05cf6e79aec74777376e56b8ee3825615e57a48b8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5295bd9447ce921d2da80865da0b51217
SHA1235c3a77ad0c8f224cbc02154491be2c58456323
SHA256c85130e53933cf1c2ddb078459dfc1fd6645ebe4ce35cdd5653e65f30fd89b39
SHA5126f5c42fb0776a52642f1741b4f0a62abc45e481c35f61ef0f486e3aae20e37951567901791b8184c4fc31a73b0521be362ba4f7352e83065fa32abd7c709fabd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cf26ed59b220bbc872d58714e19c136
SHA1c9f6ac1813850c00d6f4b17bdd616cfd0fdf5de8
SHA256a7e7b96e93cf1c35229e8a4c3957c5a5f226466005267b0063c8065c8a9f078f
SHA5128877fd31f10ac41eef558ecdfafe8c123680f4d85927ddffad471d1fd001e2e122ca3d5565710ae57e57fc1d982c4463cf883b4c63858c9a51d909cf9a2bc2af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fe0aba41723cc9c4a7f47e814b77e00
SHA15a10cca5d2314563abfb3c29167e2bd928c31902
SHA2565d762a91b2d799b51c23e57abd766dad99c8326bbf4845ef759ae545f18294d4
SHA51254ce099d1dd6d39fca1ae0b639016e55ad0150da131d366ac0ceb4558df6a44b61aaca25ea7a5c21203eb33ad55b4a9b2cb0b8434ddab3c02014133987114ca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54504ae8fb89a099ce301ea31c794045f
SHA18514a2a2b74394529eb4d73d8ad14f62aa1695cf
SHA25675712895ba229595024369951e2e16a52bfb103b0299f6caa17b1670d4f83e52
SHA512505e04dfb7265e494fec71f6fdbbb0d6e54885b63acd36cb2c9fc22615ce95be2ef00489324462bcd27d326f5dabdc8588875afe58a4ef5331d499eabbb4723c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e64ea3ec1dc27ad7a4c02e6fc4b88cc
SHA162b6863481140463144cf1cde2032d04ac35fde9
SHA256a27d5ea1b54ce0544b243ad06b5a35cd08b356061819aee8e835669e7a7ac7dd
SHA51220bc6f029df20688c6f6d2eefbfcd2c35d2b6b00c1aae73abbef546f81b64e19de0e46c79aaa1ec867a3fd8ba386a15c8fe4ac64854e7bf0dd7a8987d0ed80b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6bbdf36753736fbbef4ad08a94e2442
SHA1f8c01b3a49cdd2c80b41d1458dc64c8e124b5421
SHA2567d721fd98f19fdd79807cb1c5a2d6e4951fb65fe9efe7296621ff2d0f2808222
SHA512650d8e759f46e62471e9c99fcfc689f9c319ec95056c1f7723d3fd17f9bf0d566e8b86432bde1d7aff00d6c13b5d30f0d9c315e83d841fb0bda04d6557656448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec84f4f5058c5f96486372af508e5730
SHA132c97a0fbc618e331c5f49b6204e072a9db48d64
SHA2565990c8ee8843708060793d18ea33c45843c96aa5830bccccc6909e7655ab6b35
SHA512827bc954057e65d2e2e4a3790a5eaaf7089b2dae30211a4e7e6acdf2539f26c147b620342757d9a67a566ddd8756937b529ce8d5585b855020464cd823854f02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523b8576de36abcea60bbcf75b2dd9e13
SHA1b9bc4520f102e9a5ebbc80807de4fa14442a7a9c
SHA256d3a21bc645f7972a5da606fea13c262daceac220c5c178a4ab29d3f033ff007a
SHA512d8dc19c823ad0bd8de8c194f49ff722d0b77bf32fd715fcd758b170f426dff38b63692e9752220847d454d0a2a3949978949bf076b5ad3c0547bdd8fc0f7884a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dffd5d28283f29e48c06b9214a36b168
SHA1ab47d84657e67ab7ee442ba8980f8078f6909203
SHA256fae5ace9341962360017ccc39b0ce35f395eb4910e81324466872edc8863ec67
SHA5125909850fa8cfd053135a4395fec8f5357d39d06e28d96d110451b78420464ba4f5c692d39b8ec783dba10b47e76748d0e0ba98da514744760319a900ae089b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efa480d1bc79db5330e3fec154bf9160
SHA1ccdc119d533981ea22c61a21de3e6d0b7e16821c
SHA256a7ba851973a3a698b8008d84c4fbc3360325a05504e435e21c21b17dee495113
SHA512cdbefd84788b810430a2e0a5fdff79a56c57d6771fdfe88167654b39508769989ea061129f6c8008aa02a5c1dcfb994b41e0b06881d36aa3429c6b50b8322690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a39ffbfb8f4e5aafa13cde281fdffb9
SHA14198550af264343f15d6ec1108cbd51e7e9d7d8a
SHA256ac00b364b31f3f040c837237a68c3d57d3a4a38ae5f7b4513ea0bc7135b19054
SHA5125ef14d852305588545971bb9d90f34b6942d8482d6cf0b6bd2ce1e95e1ef0d8cfdacf2aeba03b22a1f6796f424abb335efb0d21a20f05d3a075aec321e9bd45f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588f99d781881beccae97111b7430ce7e
SHA165f5cdd4e9b14f112805c5a9acfdb44d7078add8
SHA2564afd20658f846545c08c6f988a7a33b3f72d725bcbc67234c2b09e1395fcd212
SHA512ed72a7fbc463a2216c2137e72ba51c7a2372a13f18525f2cdfda3db3bfca2cc7cabca48dd939a1abae767ca1b27f9b055444a0b656a2d1a55a7ab2bb477f8088
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b