Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 00:41
Static task
static1
Behavioral task
behavioral1
Sample
ff9963c8b70cd3a2143ddc0c0e5c6f68_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ff9963c8b70cd3a2143ddc0c0e5c6f68_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff9963c8b70cd3a2143ddc0c0e5c6f68_JaffaCakes118.html
-
Size
118KB
-
MD5
ff9963c8b70cd3a2143ddc0c0e5c6f68
-
SHA1
7be9a70a9df080aecd04b8fa32a8dc658999e681
-
SHA256
70b41d60e8c1e969862426455c4e499134975c5b11337a72d1885da55dfefdbf
-
SHA512
f2adf8f229e8d3aec8ffe169d43ce8ff899bf0eecef22d390aa2eb6c4c190bdecb4644703058564fb515dcda6acc340cbc76086674657682b5428c902884b58d
-
SSDEEP
3072:N5/vnWaGsnlyfkMY+BES09JXAnyrZalI+YQ:PKsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000fffba253b44bcbb99d0ded0016f1967bcfe2eb9a30ca377e3be2eb748474df9b000000000e80000000020000200000001447302a4d941518ebccc268dcc33e006b17c060eefdaacd5ccdc092a3e28e4f2000000077fc5b7d4f4275bddb0c2fdd6b075aa6fe8df9533e1dab1ab376fd0ff6a93e3940000000db56f6266fe1bd375773a4cb22c8e212a538daad49fe9a0330b01662e6037e610f463c8e2807d4205f8d318a0ff3c63606d2c7707c5db1cbe78620c873fa5eb8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C4454311-7EC4-11EF-A5E9-FE7389BE724D} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433818771" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10b385d7d112db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2308 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2308 iexplore.exe 2308 iexplore.exe 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 1092 2308 iexplore.exe 30 PID 2308 wrote to memory of 1092 2308 iexplore.exe 30 PID 2308 wrote to memory of 1092 2308 iexplore.exe 30 PID 2308 wrote to memory of 1092 2308 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff9963c8b70cd3a2143ddc0c0e5c6f68_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2308 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5364c39cdef196b7426f2c73615a8acc7
SHA1712acbc6c2fcd0e4a3db559bb09a40c68060e92d
SHA256360a95ab0de24bea99c15da660e9555beed22c5ef4b101783f47f7551ce63a68
SHA51228931f097b90176edcde7122477ec2b9b0a9e7abe6d5456bf08a4ac993c24ea11dd8cdbc18cbad1254909f738a23b05ea5c38e82d33c5ab9c0d343143f976c36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bd202f3d336a8200d35ee7c482acebf
SHA1819eb3dc49267a5a803121e9d6ef5f8ba8d6b7c4
SHA2561cf39d914f6d703de1d87ea355bd66656ed2907cc86a68545706e6691ced61da
SHA51226f020b1b19f66377836504b1b7027b6f908d431757dbc558b9879232b930bf44ffd8799145a5a8d4795aa3ce15676baec6a9cfbc6e4374c362b54d1d62e2e8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b315ad2ef1d4649971ec051c0462202f
SHA1e83cc455a1467c5e6412c36782177f0b067f4c81
SHA2560b33e49e823a3a48b840d003fd4da3025f99f1919fb9ec44a09576fd71f710c2
SHA51279c9b577c6bf297a1aa8e216cccb344761ecde50f594c75b4142394f7b02ff94f53fec494f5a08eb992d994930b130e363f64c9b38d4167be89241c39676273e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7114d185402553a5365eeb9947ee7e8
SHA1132f43cfcdad5791d1d11cb4b0d38a08c284a8dd
SHA256a619e4f8c96ff342c6a08bd2e606bf4ab539ffc9e535751e6be209381ecfa122
SHA5121cbf70a7fd1bb640d963291a58f66afa11be64ba5c9f18d34e3cf4e20dd49b639ac6ffb95644b3c3d683a7d3a2b1a7dd8919e7963c394d6b0061da6ab7677534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2943e7cfb3dcbe2d91cc87bb65b4a1e
SHA1fd4c75dfb53e4a8a79ddb6bbf5a55fd66d6400d9
SHA2562ef564a12e7b5497ae3f9ee14854277f089bead1051e9577df1c5fbe65a9ac4a
SHA5129a82bf3458696d3c55c320d859cd9ad98511bb6947965b1146598bac713bde79310d790a71ffde339914cbcb8cf1115f00630e19531c3c22c1e0f4e6a9430582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a3627afd4e9ac50b1f3123d7d340cfe
SHA1af34b7f0a0bdcc737c16e52532df780cc79045c9
SHA256794fc028a3f364914ea679d4f516ba756626bbb105cc19f16d63f9aac8613554
SHA51279270a4dfe470149bbc9d8c4d8b2bf09f0ba1307d3561d5cd80b046e6c1b871dd26d7526f349b88ead32791b62f561e36e7a8678325fbacf58509d6e18d9a025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e69cb281a158bc02a43dab01dac716f
SHA1374aa46586e3b8a6099ac930408e678a03d83190
SHA2568fb4282912e4d1cd8d68b244583121f138d95884057959dc41f6385dd069055b
SHA512d2e232074853bdf10c5967f1cf8af4de93213fb3a5b855440feba0fcf9ab1f49f6481b560756ece4429e13968ecc8fbfbb9ae152daec045ce378b77c0b53b62e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55540b9b573447840aaa0b3bc34167693
SHA168d47a5d302b097ab2b3bf1c473c920c71f8923d
SHA25616bd9ffd7408f2853e5a05fdfa0a7be6c3ba95d3048f929511f417c8bcfc8db6
SHA512caab941195189dad63b315b0cfd3e665f37ed803b7070d2bdfbfda4ce4750199336185e793ead6fcd573032e1d1532b6b27867fb807cc49c00b5c482ba1f7a62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e8b2d557eac450ffb4a07277913cf8f
SHA16c0a27b862a2f7eff2a926ed9e0d30640be13509
SHA256a951a1f7c87ad991c20800723c5aa394a37f1d23b7a9987c1265fee7c423fc94
SHA512977cc0c3f1ae156f1b107ba257de9fad6a62d4b27bcc1893ad0b249a423907378658bfa2d984c7ba4c8f6f4bc7fa29bffead7fcd26b98f327acf0db59901b377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bc904c3a1e17f1a8a86e03fc141e69b
SHA1e2f83958b3c568f79ad302ca4b7a615c1129a94b
SHA2569bd1e89af4860ee7793415fb87e45693123f47d6e05f034e1d74e366c899cacb
SHA512b1d571b21e08c3b92779eadc621dd814cb79cc431e6a5b3f141c9683c2b2c15b2a7d36cd71700a578e3d1016d2a90d36aa37d51a7c665de19b704cb8b4388865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c94b18762f835157576b61651e72e5c
SHA1930b0eec1aa8ff3b555a36686d2a9c8c55fc742d
SHA256fcb5575176db78ae24a838c2c1521cd92a571192eacc160b72a521b059013f7b
SHA5122b3ba25ab6cee1d5b9a15ef1d75ca67e147e25e5b59ebbd45bca9c5325980d908e0746d82ff77e0260fbe05584a4e2366362daaa22188f77c55177d44f6324b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d78ba45189be86c6ec06c2d22045c342
SHA1450fb5fbf8828d622f10cd0d4cb4152213f796ab
SHA256da1cdd067e393461eb0098d4eae38d45e0177a14d195e6fd01c2e87b21cef7d7
SHA5126c2b4829f6f6109a862f84ddc0f058e3473d4b7fee12a9e5d5e6981057c2f743b2868a3450b72d54307eda88a168cf14d06a62df7457f5fb0c5759c34d36b9d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9e68ad8f6007c6879733105d07c5332
SHA1b1f5a4c4ad511be18e6dc2dd783eca258ea97393
SHA25696cb40a24f3dfc5d63679f95eb6bcfc22ff58d85b143f78b95b8a8cf2ed836c8
SHA51210273df7d7bb1f4cfc1be98d803fb1df7812699c57e0e3974e833816402de70a50eda39845f8c5c61f08b9467577a3ca3efd7b71cb47c5cdf552cbfe9b13c626
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59707f6cb72a08cbee46e1188311b0088
SHA108d94655d4e736c7f8bd7b0db333d8f1b8012110
SHA25617c438b29405fbb0fa51091b78839357edd9cfc466ef607a0af224a31d5f7ad7
SHA5128989ad29badfd8e43264ea35be3e37773abc7e208a3724d899e70553a8dabe51e95a638774675229cb3c767f9f66be1483e7b43bc9c983c2fa6353dee8601df1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5864f3f327c77a80b06d9a2dc85f610a4
SHA14a83513b705ffaaec814b2a8a7ce89f5af7ae629
SHA2564cfd6199e687d27b610f29abfb7a5c9ad55b0a1ad713b230cf73c8c5a8167d2b
SHA512b2445fef8c437e1c2605202889dc8047d346833c28a9807ced6a285fc4b8209486aefa1ce88c2ef33b6c3082117de6c8930a540cde229b2e537a19fa310b6645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a38776f9c1f64ce23463a20d63aa1740
SHA16e2cfa11ae18c6435699ba1269ed24bd12cdb17b
SHA2567cddb7fca5ba27b65d5b249638c62c3d538843c10392088c706645ff0c878b6d
SHA512db1f0d307ab0b01ac1a8be7aa388c012ffaeff9ec2c7bb000e07e7fbe481dfa647d08b004ddbde242a5d3965c73dc507843dc346537a270e1aa8f3a6f61737d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f25895f3584699994fb628dbc6e0507
SHA1a7645e24ada5556d4ac01c15fe741e0e47f99ef8
SHA2567034b14545f0e71bc1e7bd62dbc17bd00337821a9573bf236cdd3bef5ba1d0cc
SHA5123ba9cb9df94db386bde14baeb207fc68d91a539a5302e91dc5e24469337fe7160bdd5a240e5d2b29cbd197ff52a313db393750259c0036a6de8c45d801f50357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff3391498b5e5dfe5efc4eec935d8d24
SHA1b97f22f4a796a8084e86596efa796e6d401113cb
SHA256d25c2a74492168d41e23e14aea6c227336c8dd273de29abb55d09225b57af144
SHA51218b2dac22e6dccffcc4bc18c8bad1dd253865097a0bcd17af81e1cedfc47856a94e0ce2d9eea94b0924e1003515dff73d60b5c7bc8c7b27788a3ed0617c9202e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597f98ad755dad301b6830ecdfde70e2b
SHA1dacb9ae3d1f2decc3d8d860c6fff3f0369edeaca
SHA256713ba3807aba8aaa93f17ff1595782711f4614018d7ffee2808270a3bf569d1b
SHA512d20e3adfea321ed3e9a7e74b12d2918cfbca8cbe18b4ded40ea5fdb691f4d099b6d6752c62dc74ae743d1bfdafa7baac375fb80e0b3208096f8ac0b11ac17057
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b