Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
68s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 23:02
Static task
static1
Behavioral task
behavioral1
Sample
fb100a517d28d5cc9c3fbd7dfb7379f3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb100a517d28d5cc9c3fbd7dfb7379f3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb100a517d28d5cc9c3fbd7dfb7379f3_JaffaCakes118.html
-
Size
120KB
-
MD5
fb100a517d28d5cc9c3fbd7dfb7379f3
-
SHA1
d762c90f127c5e6403b218cd2ce1f4d1c8ab83c5
-
SHA256
a5ac97a96dddc988f2eb546009ac28d1ab397b6a9c2d20f547b2e24188ad4738
-
SHA512
53b0bac404bdb784c80a180a2616c5223f4eae5d7c6475f7a522dad6a9663bac94ebb2658e2f0b47ede4ac509dbcd49cb7ad187b9c6ff654895b165bb992bfc5
-
SSDEEP
1536:S2TxyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCW:S0yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9CA62EB1-7D24-11EF-8FDB-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433640036" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000894b425a51e0e0bfea4242b334ed3f79d9353b3d42b046ee00967eeab0b124ce000000000e80000000020000200000009d88355667d2071b473ed30be6ffa6fdc467c539addc406fc217b26f18bbefe0900000003692c1cc654cccf20c69e17e40c88959d8a923152316de29cec5884672afc298d589bcae35f3330f8bab63e5b06669f24158445c4296bc0d30aab643ce6b49ad049962a2fa79fb2efa583fef5f11532db442f5c5368d13312480e2a84ce1bb9bae814f64f9714941d635bf2a7a594a6a421faf1f0a3b65db7ae6a3c4ba01aafdc6e5bf37b8956c8346aef4957e2d4e35400000007211ec3c0024a638a3a22d795c0f50605003ed45ada94102025e75f0291019b863d2b74d42772c4d028efb9e68c083a14313d35265b68338600b21f6b65be3df iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a038af713111db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000b8f64b8ed94cf13f354bb1093409410ff06ffc338ca7d45e8995a56f4db72f6a000000000e8000000002000020000000aa8d1e330e9c84689a29fb6ecf69c8195c38bae1fbe1726e126441d2a91c6fa5200000006b0be6183385d78036127880c943a2c1d11dcd0b6b8ea8cfd2878d0d7ef4bc96400000002e4a6ec3bb3b61d380215d70ae104de4d3432343298935c40d89305d0b63f37ea5015fce7525d501e745cbaa130478adb937a027ed83a559dcddc355c020cc61 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2468 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2468 iexplore.exe 2468 iexplore.exe 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2468 wrote to memory of 1028 2468 iexplore.exe 29 PID 2468 wrote to memory of 1028 2468 iexplore.exe 29 PID 2468 wrote to memory of 1028 2468 iexplore.exe 29 PID 2468 wrote to memory of 1028 2468 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fb100a517d28d5cc9c3fbd7dfb7379f3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2468 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d8dc7cfe5a028850b4a2649b70e2b42
SHA17d779f593fb4142ef57c5e29625e3cc2e86a2df6
SHA2567f7c4658c41d07a9a57951ec6d4fb17f56bd3497f0bf97125811bc8077ac1d35
SHA51216c9d11f2fa13d2726ec816a3868e1683d5081ac22145bf4848ba7258b573de230c9ba9fd740a9856e900f3f0362f004a02c341ff0f236b175a8d95401059963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4817fe18d510faf899d9d6d6f274279
SHA1f102b758c650513aeead98323d9c2bdea6340406
SHA2568d4ea8ea38e40c80f260cc85de0992f5b5c75781d16800bd7fc10311b8edd40e
SHA512741e092f17175fb0f44e09ac82043cb5c9e9ba5336ef1feb875e4e6e2fa81b2f67fa3d3d39ed0fe41d265fa996e43361306d8dbeca30e8590e27b6e3cd93ff17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541424e3e5606caef05a01d5263820bb1
SHA16c13b97962d16adb94e00e05b8263aeec10e027b
SHA256c01bb7e32837fc1ea7db48bdee49e0f543793b67a2398c01e6b842dd160908ee
SHA51225f8cb340619fa3d2be03783e9622e387c75060e0db36f33fdf167cc016a982f576d5da7a041b562f45c26705e3dd4df54efe5ef336d7c8b3ff8ec4290a30ee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f8548c6a280587f576aa490ee42c2a9
SHA1abf5c31eb64c369f35a46cbd953e766f56101225
SHA256bc72c25bf97d1516e77a86a97e878a7ebe42cd055a1dd8bf3997008f1ef92dbd
SHA5126cf65d04fa990123f10320a97be4693d9284cad9c53f9b7a7aea5cb25f5feaa6a221dfe022baf02a6be0d18c39d04bc6225e5c1d823ca901d051a9721e7c7ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b35d0e57a77e8ea01e837d7bdc39c19
SHA171130d7d4d6375ca82749d50502ee5a82647bff9
SHA256104a8fc4b47f9d10dff1d2cfc83a9396fe56ffd608e0ad7a39a305341f5f2159
SHA512be6cea4b3add856e596e6bff3759c22b5e443620bb3585a71ea6dc879e4911b400c46c51a3bde6137aa58440736bbac8f8831db4f03ac84d023c4eb0dd006a1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bc9995338b06245dfe02412d129e867
SHA1786f53c93eb6fbecff73f3dd9b0bc8d1c3949ef1
SHA256328cba7b22e0f97641a0455851d01e2cbaf53e292d5e5af0917f1924952755a9
SHA512d6498f166f3eb80dd248aa8aa060261f5e90da0ee3c76147fe3cc1c4645d5f30d09661a0d19fa3e8395ce7914cbf9639b14c94dab015d5210c04e44bb8db149d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c39798646af5c55b75501c9f65826cf3
SHA12624c4ab8971a16174c1b970b7132f71c8674507
SHA2567db831c32b9e75d8112f6d252e472ffe5cddd320f8e0b56a914bf503c36db733
SHA5126a86cfb0343d6bbd36eec3dd9c26a61bd9caa374c11ad7398ed6f854205fa88a8186b34338f2a83c7ca3523b89d634312ae2e5c2cd5fd73b586fb65f7989ddfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b97a8344f22c63f5e7f1f7dcc1085574
SHA161cf440673197a3402db71d0f282979dbc627b34
SHA256280ad5cde12b21910ada36bbf5cd193593bd4977ace0c489a4e77b57047bfdd6
SHA512159659432fb5c240ff7a5bb25fa1c651c404211adfa12fd62fa1c626804fcb156cffe73898f656217a15173d6f0b904d94d7c48ba50aa99a77665cf4eebca27c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549e24c94fb637f92945fe517448f3b34
SHA1d2f9376b4b53c46b8332e74b7f5c49a40eaf955b
SHA256ec5f302b8739d0ba9697940f0cc311201ad8d68f55235e85e1019ef187fd254a
SHA512c9da322fc72caaa278aff8c96a838c029b1844c3ecb49ebb606a2908f1d67581fa2258317f866764942c0318a2c645861024da0203284f3fd1e491694f64eed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514689ad28ef1a4f82e16b3f89043582c
SHA1a56dedc694c92ef51d712188524b10207e582c66
SHA2563a4b635e62a091d87ce0a8a935ab9374ccafafb2a1882ac2cc8ea049471dbf10
SHA5126f8e9fab0b06a2d96bb865751c26ed2236a90369b180885a48c2bd34f1a0da49e622e8d59d1f8928a1aa2cbc1b8cb5a43979a3adaa6efd772599328d5ba6b2bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574768dc37bdc0129b2977b3740f860b7
SHA120bafd18758bf10e400fda9f1bcdd2c346a230bc
SHA256b0f15133e1482e4219ced10ddaac603072a6a9a647174f894094277350dd68bb
SHA5127e62790964e0f3b29972812b94446924db8e9a060c94464b37657741cb3eba1eab57f7a28a4a4641a820718f4ea65d57aeee37a05027ae9ae81834e88775a87c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcd698a4351dd0192cbe54c6a9c36885
SHA1710fe3f87b59a481d079eba9d0e7fc654a2d70a3
SHA256aa45e1ef291d1d4d3e2578ec9fd49c45ce4bca25622b79e0331e0b86d96d033b
SHA51218fd6837ab794fc1a7f879748a82558f341df13f6cbdcbaf7dece56bf4db2d95b65262daaef20bce4b8f74da29156fbf83a1c7d89a07106391830df11a0ab83c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc47d1ff46c92433e6221a9a16400a1c
SHA158b388a73a8b1cedfd56a1b11536287b5f470cb8
SHA256276ae08e737ac39f544d4a0ec78375af01c2e590d8829978dd737c77c2edf276
SHA5127ccc090728c9d02592a6dbebc4b04697a2bca044fe6a169fd536ad023853106116264199c6d7eb5d8b69b8d27a57a4212874f8c86c79695de9da29e9e7d847db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d4464758ec446578065eb018669f7d7
SHA133c74c614f782f23182e4173cdf31ce2a267e8e7
SHA256e006eec0be5b082b99b1b24b6d7343cecd281d9d714433fae2f0d0be4111e676
SHA51227a5c3b0070f221db600c5aa9cfe6a6d798677fe1457657a1aafe94ae3da27ab2fbc9ad6a878e7ee4c21ddd1a53732f31af8992ebda1996b23771ad543ef7ddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d155494dfb43dd34a0df1cec49df17f4
SHA14a5583aa67470421e7cc48f2c4778afa3f91de0f
SHA256e115b9e790d3ba790304a6d4eaa44e9677c9b14f738c050ec2a87a2f63522fb8
SHA5124f329238bd298380bb163f2cfd5f4e94fa282a53b2582ec804f3e302d093b3898f39a5c0d063a8e43630c02531de9caa35bd7b5ed0c4550e3f380f06d316bd26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a612b51143aeafc1cdb1b2b44de2382b
SHA1a22dbb0a2ca5c6281dbd96881da9f125fe62c4e7
SHA2562e4a532ea6cdcd3c817a99f6a4d5d17e78c1e5f7eb849d440091718e1073d8d6
SHA512d6047d9060665da31ac8316ef075ca0acc6831a965d9daddee56a690546742bc572c5fc6a37e2a20e5e36f0669e5d83bdc874e5e84c5c2b27fddfdf3eb5b7d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fd96d28f3e2ebd5e7c0337af675e136
SHA1e2408ff5113bef2ff2218f764c1761275bc5ef3a
SHA256e1f62aa3827e943372bb9fe1b41b75b91a6383e1da00376c64024e3ddbb1b33a
SHA512f2b2a5661bd32460540aa578503515e0a4d90ef11fcdcb5aa121fcbe2274b575bc953c76281eae71face3f3cc5f5ce2f7aa6e372566ba75159f1dbd32e1ecc3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588990cb1b6105bcb3f7d8d58ba11ad12
SHA19989422086a4c725a1b420d0d08e32afca4bcefb
SHA256e7e5e4834e21859e402dd5fbb405df0a5db9146ff8a94db9f9aee234f1494ba9
SHA512635bdd53496dd7d3c3ae1f101c60515e7398f93df45c5345985b5caa441e24fd2c38cec1b7f72d670e8d2175a8e6dfd215f1a5b61169c547517859ea644608b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbde71b7238cfdb80a6576097b618d8e
SHA1f4284fcb58b2b6c909c134dbc648fa8f342c1e1a
SHA25624908ca6bbb588e67ac23faf1f612383b451023891f42e6fab10b115543ee84c
SHA5120152b7665582384774b5bf028a8efc1cbf26cd29893faf0d67bd2f24692341e2491c3f5afe93752da9a0b5f5a150f0bb9a0ddacc8daed2dec2a131608675c6cd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b