Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 07:58
Static task
static1
Behavioral task
behavioral1
Sample
fe1844f36ffd2bbd6d31ccda304a2e37_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fe1844f36ffd2bbd6d31ccda304a2e37_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe1844f36ffd2bbd6d31ccda304a2e37_JaffaCakes118.html
-
Size
219KB
-
MD5
fe1844f36ffd2bbd6d31ccda304a2e37
-
SHA1
77ecb4169159b9812f59e0a87042eba541de3826
-
SHA256
0409112cf7dea0e7f7fc6ef9888b98f6ba2361d039b5a928c9342b5dbedc4c68
-
SHA512
6162344161ee07895ff4031708bfec331ab87d3d1801c829677462eda14e3101a1c30623b4827dc1f19ad1f6774849ff6f80c8301b3a9e7cf8432b76b6ba88ba
-
SSDEEP
3072:vyyLvz2Y0/aA/vrku8EpELWADp6VvBhnwr:vBvze/a+DkfECWADp+vD0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000006d036479edc2b6726cdbd3c33aa5116e943253278d9fab29cb96c4b75214b9b6000000000e80000000020000200000000a49e95e8d58996dbee497001c6c58a1b5b1ade36258f5e7884ef9d808dd9e59900000007f88c4b3e4e4ef21fcdda15b54e50da8249609cc1399b0213c1b1730aee6ee2c8bdec221f3ce5e1c9380b10ee44d17116184bebef3502ec9d7b022d3e084fa9187378fac69719a455dc89963662985e9e76ca100eea08548144c6518a7ae5c360ddbd1dec5302e163b119edbcd7ef040a740e838be86e0b85387864015a0255729b8b344a8bc96ab45cab3dd03faeb23400000001eb49bbb8f7fd71578c02f54c72ee47f684f41da2b76627c75906cdb58c0f0cce5dd4abbad4867dee4dd1e2b49a273ce55fbd7e39b597daf304ef8d4dd431133 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000a2fafb7c9247ae7d885cc0793316992bfccf51ff6b389382018cca3639388202000000000e8000000002000020000000dd8eba3486b3eab584a4e617e5299f4daf335b6dc147a34a0fb7c01db3da0e0c20000000b6cbd761c270153314e42cd314d3a77474da2d55296a7badb8e4634ce4098e994000000005f47ce441d772449b3246ecf1d737bf34642daf1cba34b28e02dfcb7bd482b20d55eadfd6f739cf4dd56ab6489c32c5801c948fdbf8bce5cc7e1fbf95996a85 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433758556" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{91458741-7E38-11EF-9584-DA9ECB958399} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0f5ae654512db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2704 iexplore.exe 2704 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2940 2704 iexplore.exe 30 PID 2704 wrote to memory of 2940 2704 iexplore.exe 30 PID 2704 wrote to memory of 2940 2704 iexplore.exe 30 PID 2704 wrote to memory of 2940 2704 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe1844f36ffd2bbd6d31ccda304a2e37_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2704 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574647225b5694070731d15bec865a836
SHA18f03d6f61711b71048a26cb7963d82806ad59b7f
SHA2565df41bd99db11554806a3f8dd0b628e6789d75db5fc5a87fdf023fff281b41c7
SHA5120a66929a3343b653946cf46b8210776239f01033584e5f87417cf523a609a4de79f8495dbaa7810a8305243530d81c14e2e764552fc4f2cc0051a81bbd605e3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deaec195f93320760d28ce546231b83a
SHA161af94217b252593a7cec1fb9619038269edb3ae
SHA2569cccce863af90bb93e0f0e1869d1b56efef780d41de1b79878d8e27da5cd2bde
SHA512492f2c20df26a0b5961eddf7a5e10aa15f19540b8aa6c6d14e7ed66e35158e757d01bce79df558c8307637c00fde50fcd741b89a95c4dce5a7e809d574a0f408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58034ed619cac31048ac89a376b369e8b
SHA12666ff85c488157d479a6c7f22cd11a2952a86ea
SHA256c9aa79e97f6ef99e1ea40d5ad3a80230a01c0f41203c8334e5ed25a2f3efbdcf
SHA512813aa27442dd449f59ca64856877523e7abff86b0d06919d10daf3d928829334b5c5dfaf6ae74405065522d8323dafc64aad26ab0abd1dee025e8f0d363b5d0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4a33b547a0e740e56381d322e0d6a92
SHA1198d5a3eee6e14b4ab583b6bc46fe104ff3d8014
SHA256091ac0118333a815bc2e67cb90139cb79fabaf7611a356b98cc4f1d8fa956c4e
SHA512f645defc44dbb448995ce0364c1b3484735bee54d57d83326cf5888fe9be2eb556f2cfaaab85cb78458226ea944f437e0308c02163ca7c3bd0d200a38667a0bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58869c1ebbae0dfb73421c54193c71d5f
SHA10fd7926676936ae746946157fcf6a4961bcaaa80
SHA256e3618df1ea8580938a5e8c186e4ae556257a731964dad38b99d3ff2afd881544
SHA512ae368367849a4f711e08d78daf06f0cceb09bc5c13e3f54b6ecf7574146af484dca90acdccfe56cabb5fdde107cf159a8715d9894176357d2712168751743fcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53636556d3f9ea70aaa6b0d0d800ab14c
SHA1dd8b346669de098259b10cab5210f0c22e618b91
SHA2569c0295ff8659c19be73c34a3869a476e4896ec954be9e9995682a0a5514bfc1e
SHA512d41128a27b25fcc3367fba3da3db7fc66ec7e25dccbd3c6a782bf325dd6db2ca38966bcc8fdf107c10e90d36f9fafafd723b283a56e077d1884070904325f6cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe3f0834c16ee20613b4a52cbc461e12
SHA1cbc973ac798d5856cd3edeb7838926b7e69f18d6
SHA256ca7f5b2bef726173ce3ebed60ad6ee630a7cb022479e6ef9be831271b0e73ed5
SHA512a82d38d9bff09ad491c477d85a8149666ca14d17cf036e64045c80db84b666ff7d42df19253d4265b58cf6ff8c355757ae570f227152e38e022d370c479cc79c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5998087f460954343db5069d229b90c0d
SHA1156dba2fd960eeb7d35054e7ac4678557388479f
SHA256b0f3d5743f0e0c0a262b5e14029c3a40b9639c04dfc12cef509f4c25bada6108
SHA51238fd40c7d61c61c794352351113c9e7b95d24ae59a4ecb2f032e691d900f43070cc12800f016ae654a0b0720ce5f1d95bc9765dc536031d223ac340da5715954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c3a4a1fca75b6e6649f561157352deb
SHA1e629a9dbce3549cc3b50b483185e1de52b798e2e
SHA2566be79b48a149166b0a402c648cd3254ebe14214417ff070023ff58a03b09b4a4
SHA512a18ed2fd705390f1acc99869ccf3d3915816624a0971c457336082a684f40e9b03badbcd426de393f27d769b21e3aa86bd2ebf4fee04fcc97524df22b2edf3e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548f149fb9cd36c94ebb7d805d9e0a12e
SHA16a13a963dfdb5ff967d6ca30135d62b9bb2d34e4
SHA256f3d6ca6ab499c2da6abbbec09c57eed63caec3ca765807c0f97593cea33a0104
SHA512aed9b1f93dd1ac10f5f7d24e1985c7588b5ba9ce11e8938e27e3b2df54d297e0f6bb7021aa9efab965491b1c949ce2db69222cc382a3b104e60343ee7e0c8dc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfa2f80e2dc0e52775749b70cea71017
SHA162d835999b0f34c12f3a068984734616f2cf44fc
SHA256d48b8c4cec396a89467737c587704530d65b26dfc62838c3dcd9d8e28e6e30d8
SHA512444822a962a305e85c4fe184842644790dd9500b4cb50978e95b6b2343563bba0ff1566e9f1f38f6e57ed79a46ac8d5813a6696802b739632554ec85c20ad64e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5399fe8a95a52c75b2562c0747e6b04
SHA111050b212fd5789fbe913a3c9443c3840b9ff86c
SHA256e904ea8907cb4d7cd58b08d1ae6aa995253413081d6a922938408f72d396bc9b
SHA512085041774f813eb6becaefe6d03cd28547c2fec8a2791d90e5c6e850f2603cdf5600dfdc6dfafc1731eac927b9928622d1659b8a13c778e1b950daa51e4a17eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55370e5fe7fc9dadf198f100f13116584
SHA1f989bfe185426ce6477706e70f22f14d95da7100
SHA256ee14ac1ce05610e6c7fad3ce57cdc53ab37fcc2ffa0128b0c5e9cb4c5e8214a2
SHA512f9918a79b7950c48acd819514625cf09a85c849dca2c160000f1345ada13b6facc1915215ec61195d7d4aefc0e90e7617a4464a230776493264486cf94b52894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565be8ce0e16e5a04fb4cdcc92fa4ed20
SHA1b9dfd2a2da6a9f64072e0b776558558faecdb070
SHA25678c98124c8fb6b9d369b47c9be4bca3331bad45932fa78327764d94fd5280bff
SHA5122d004fe411a175512853c08ecaa2522cdb5b1f21aaa97679ac4f8cdd14f1cef9ffd073331e7d068edf046d89dc46decf9a7d50b54d5e874acdb7fbb47b5b995a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfcfcdc459aff9318a6915cd498e5c5a
SHA1d04aed4140fbe7e25e18a1829d3781246498b7e0
SHA256ae0921746817949c218b35012c6d7d8cc5e5f017ed1102963df1979ac91463c7
SHA512c1992efa16c220f4708135307579f151bde3f3ab666d701a6aa5ba93ca3759c21c9fc72390b91ba18e88ef00c8313ee4e725b69be2595a1f373f138fb8bd579f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aea7a21e58dcbdf1f86137262a66b158
SHA1360e3c7f8d82a215fd9573f1b8aa9237cbdae3ca
SHA2566bbdcac9b339ef843a3a7cf28a5fc829f8e8c9c2599c4f7417e7286197942df9
SHA51215fbd2676c0c2e13ef0eeb6c2c6039802dd1a661bfa8b3ab54717a455dadd44231a12fa6a342b43dff69a58e810f9afae1cbfe854d3568babfe7f9b6ae8d23a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518a83713540ca7bb4c2c88f5a4f1c412
SHA1980786bd426dfbad5e5e4b8e925c2c8c9f9abd43
SHA256c9b1e27748f6792c9a90f02aa005561f6ed1c086d5546c148817e62ea6cc797f
SHA5120687f34c9fdc894a9f970131f67a8712e1c8655e8ef1cce5ca6bb2e2e2118b4fb641d350fcc9efab849fa31bd5fb84976424cd0b4d10b4c9367d046f5b9a8fa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585d557a73a2c81e38e6357b42c043321
SHA1d27e973a19267b559832813a62ba17dfa3d0f3ba
SHA25688724ba3cd2854a7ca2a0d8ddbd747541e247c99b426914e0fc7ad72a3ec650d
SHA5127e5c8c0e1ad96fbadbf96f7397fc275055d5a550044a96c12ba198bbf176b7ab731506f3500fd843dc8351d56bca5a7476593719dda37831dfa0bbbc53b506ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb97578f2f1e291d341c60d041b8ef1c
SHA1f3a761229bda4b92d76dbc7f0eea37b34ee6bd71
SHA2566ef656c0b816bf16c7c33e1469b3c8162c07fbce05c3d59c4f4dcfa5b39462bf
SHA5121c8cb6f445e4dcacf800e8d0abb5b206f6dcfe0f0a7e8741652be5bc4a7089fc40e9f299983974efd8a5fe855f43c9df99678a8666de7a38823fd5e19061b2d4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b