Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 05:01
Static task
static1
Behavioral task
behavioral1
Sample
0e0b264080634c73baae068de354fcaa_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0e0b264080634c73baae068de354fcaa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0e0b264080634c73baae068de354fcaa_JaffaCakes118.html
-
Size
128KB
-
MD5
0e0b264080634c73baae068de354fcaa
-
SHA1
b5cdce77f5a7a6507d31211a0048e7b6a61ffab7
-
SHA256
8f160a02b41e1a2170dad8ee04f3e4a22987db1ac1326b17864e58118aaee3dd
-
SHA512
99253f7cdb14ef57a490a1205592c2862e95941a0f16eb0d991718327554dcec122cfb1d47d48868429403139dec90ae9070a4ae2abd924fb92a4fa0746a7c6d
-
SSDEEP
3072:m8zH1ZG4j7QHEYmLxyQVc8Zt3Cc8nZ7U5/wjE4XmBL7kMqo2sI8Vz+St:tzH1ZG4j7QHEYmLx7Zt3Cc8nZ7U5/wjw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434093585" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000005e39a1e2b0ac74a36811a6b2c7360ef5a94eeb6cda6615015d45c752fd2200b8000000000e8000000002000020000000047cab8f8d4f8f00276d208d4a98851a4235f55cdd542916be085b364fa1e9b290000000e357a45648d6cdc3efd1661d10d75f17d27d8b484695ffa64e36641506f651968c3dab746e83337c51421bf1fc788f0f77f14abb9388369edb35ffbb0672ed9e51edb4084de485d092df3a2c33d690fb402ca033f7ee0bc2e9caee0294a792f9aab23bc2c451db883f6c1e852c13db23982c22b28180c10dafb66f8e7ee76a039a6830582ecb0f20bdb83c4d00bedefd400000009028a7ffd93fae3ae621dd6b35bb40f675f773c3e70c6d67c112b31735d438e2a8f8e95b08bcc3ae5ee3b064fce76ffdcd2618583ac851cdfd4533eef2f0dd16 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9E2513E1-8144-11EF-9081-4A174794FC88} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000004687dd66d5310789032c0fbd6392bdac65177b0ea0be996f1d58898a6681f359000000000e8000000002000020000000e8c40b7406c3e6f3dd6758b691e637e8aca1e44874da2fd3f95ae65cdf9d954c20000000630ff11b1efcc65f9d9a9ce08fe6e6e6a46d681d3f22c22ae7b149d327d45b4040000000092afe04ffe18bd88ed8b6296bc6afbb26743c9c29a49d80ab156b20694d613e98fed7720feb5c1f5f506a61102d1ce2361d4bd0eff83495c0a2ea80d766d0e4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4083a4725115db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2092 2692 iexplore.exe 30 PID 2692 wrote to memory of 2092 2692 iexplore.exe 30 PID 2692 wrote to memory of 2092 2692 iexplore.exe 30 PID 2692 wrote to memory of 2092 2692 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e0b264080634c73baae068de354fcaa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c3ffe56682b52a46add4bd16b0e948c
SHA1921b56a60886d448c96de60bf9b371b1136f7f74
SHA256d123f2c5a8b4d5b6c1fc8717ae9fb0722d77fe4473d851a121641e62829d0f0e
SHA512921a88ef917e57ba6a80c7f4d497c8826fb754c03bb62d6785268c0640073af393f36c80364b5b8024a505b302dc1beb25b00cd8d6ca1977ad8d56cc86deeeca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5047190dd0623c7be2ad4175a055b1569
SHA1c9cf0070b3a2407770ca9fc860a6731bbf6d7c41
SHA256d0667854e4911458a36d9d0e87067fec25497bef4a7dab50ba473d6326a97955
SHA5121a7ae0ef4c8a540d458f962113e4816cba0178679467f262259d60ef4cc020f314fc001ccd2c04836311d16e9447af50ef6599c4445d8f253e46b909fa457c73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f407d2249de461f804665ab1c17cfa2
SHA16fc72340b7890647a6411ef83593f180d825a484
SHA25628d209591316a7659615532edb49c0cebc0830d071f2dd1a0a4ea6d7a3ec428c
SHA51256873dc6d0cd457eb9fbfa304f8b13e5304ccc9c848432a81e03afbf4353de9fb487c0ad5d148ba67b6f52da12d4828ae1ba5ba77b7cb6c6d78ff0b43fd31721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c2c955f474841c468cd252c43e6b465
SHA1ad71e0dc9b9639444b53dc1eed19fb961f9b7cfe
SHA25659c88e27ca73aaec6ea025bf2a4a957f94f7e92ec7e459dbb2fe6ac1911acb44
SHA5121d93ea324bf9a32bf564408a88b7dd0eddd3fbe3293392d03c49a9084e141e470744af4835c587f510b4352f88cfb991c7d5cf6e37ed463136efa5265cf16526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eda248119d458e7bea1a4bc08477d5a
SHA124e0dc43e369285183526ac7f2731564ebac2404
SHA256ba1059913251bda5b00ad0d5c703df4d6514c73a4ba1065332527e82d2f9372f
SHA512d2032c222b0c68845a0070fbdb0f924da27c382c4c17e27b9046f8e53ffceb5c44556067473603e6350520cf4656cd45b29534990af6649b1b131227ca8f35d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524bd5d63a55184d75cb950f113fc900d
SHA192d94c63a9fb823bc14249c1d5044e20ac64d88c
SHA2569ef2dd3e0a08ef4099be15bdbf42e3d5a7f56b5f5a51a67fa2e5846fbeedef9c
SHA512bf1bdf9a189ed197de57c1ad59d347cf46f2863ce6f83cdb23d8cea3bff9d80fdfa2d909190d72475c8acca304ffdcace1ffbc9eef3c402a3cc720c69a5aa241
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6c048aa90e05a091a1c87d4d268a6fb
SHA1fc9d844f4d49d186812c9f6ae48675b55959f583
SHA2567901dbf461c3ad5c9436296eb4d53bfd9e5912e0b0d2f57da73abee13250d801
SHA512e40302729f263c743727fdc6b82fbed2b8f83b5297365252e33c96d9c96a1105d0e90ddba5523161a711aa81b6cef3f4000149f13156e7062c15987065e994e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eecd213879af3f7dbf085a0540b4c186
SHA135d7bc7a0e7afb3ace5e567fde2ed44703ea3612
SHA256a8ec04c6366522a3bd719e870835c7b07b502a9234242a2ba0ecdb7524cb4b32
SHA5124ff51fbb5c30044e8b7c8447048a65485a1bfe2d212ef49bef1305215e028ef61d08c8a0396b0b32d1cc02711846dbf26d3b1ffc3f54216ac76e2b43fc498e02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ced3223436cc441315c36d15931c0be4
SHA1262736d3f5b5194f0102b839f6c568e6c88a062f
SHA256ce6a5651299693ed472f2f4fb1d49e7ec64ef81c2acdc687a99299d9a4cdf3e8
SHA512c8c2435fa9b2d044e64e3af836a20c6cb63778098412a8094540a14c10b79662e7c4ac277f58c5df9712c14a7f437cfbcae59ad5073292eff4475e079a9d5626
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567729b1903fdd5adccc60fb37308151d
SHA146c71c8e7a1993afb19e89afc71646168d479482
SHA256e2d74ede7fa16c0e35435c41006cecf08bbcf3d89edcb2db81fa65c0f5fc74e0
SHA5123c7fe4a94f4dc65cceb53c71eef62db919f26c6fa688fc83597195ea03ec0c713e7ea24bda876b20e9ae9b7d9abcc397c53772fae0a65cbcf85eabc8ff7e6d2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5712506d891252f00c8d65f3aea2823f9
SHA14777beb5f0ab2f26d8493b6e0aebb5f48e687f6a
SHA25668bf205fd9cbb7854a4739df22e64ec43d8237f0500866ab81de9b2b9c2d7ef8
SHA51204b8631ed563935756ebf3d7daf6d9ba43ce59dc2bd449e097d9c55b64d28e647de989b94f40364dec79b3aa6e3d541e90b0df7e716b538c79d59f805a492de0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f65cfa6f3b70950fd629210973a8ecc8
SHA1d2fa1beaaf22f409c4e732d9014af4d5b60b97fd
SHA256ce3a0c0c7282ba22cd783d95e008f2fb332fe92234f1d992ec9120272b99f510
SHA512e37d514088bf595bbfaf8e0b9088f1e43889c87f4f406646a17c5089fd6cc76fa8d174eb849ad68cc1f57c4b3e58934600f725127b0f0a9664fda2550cde011f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edca0b99af8db148249a5ae20428603f
SHA15434755103d5ccda58dcb3f1fe9fba6e6c9a434a
SHA256546a1900055df149adf9c6e85bc88b71a698970a710e446ffba3fd6a53578b6a
SHA5120198b16d9248822d138fddb7c22048b78633460bb77649529716e50ab75f03290dbe5291d6e1b8405070de3032990ccfdac22ad152b8dfa8e623e0fb9d6a856d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576f22807fad6697511216518c1ef8abc
SHA11ff40035f419dbdff26537a2987e40d91d70ee14
SHA25694103f8a6872e3f711def6129a6a3905bcd37181ec7c6384bb0ee45834115608
SHA51291ba727d4e7935e7bf0f7f4fb3fc9cd5f51d2ceee5296a9ab3d3fdfdeaac379572c7a345d2a0060dccdd573851494a41abf439a221e89db0ea215433a8accf1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584636709016ab00bfd7e52385162e76f
SHA1144bf610f6219849c35c48ce812450ad549634dd
SHA2566623e362933073102d2191f21a0f4e2523d64eaf0672bf255cd5ef811f5558e1
SHA5121d3f3e7f7544e4ad1e0996488b63d45f57615585a8c0a172f0c464877d838b608dd4caf5ded378a198c3787b4d76ad4a99c011b41caa2b2b441ace4890e722e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca0623024ff9f003a9b0fbf9c54abf4f
SHA1062021cf77eaf5caefe0e16898b9c74e0bb783af
SHA2565e482702abb8f75342b0e1cb0f8389e5ac8e2ff3d4bf17850b31b2525390ecfb
SHA512dc8471c4ec07ae78fe2d0f2add01b8a9d9ff7c61bbfd83f88f0f1890cca8ce1a4f1b0d764234b78c861d3b206661714184a5377ebb8beb0e6ed328117bb93d8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e18fad5b68c23423f19991c0290ef17
SHA1dca3ee37ca1597dbbf212f066c37a3f5ccba93c4
SHA256b31cf05e8347fe73cf9488899e24a8b2b0141c81eb7ff3b590512fe2dfbb5683
SHA51269ad57acf34cff09b073f91786e551c1b94cd8671cb80c633d24146a6131e8cbfde14aed447816e57627d75bec307f2aa0580e19190d8d2f00d8c26ff4e1ecf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cddbe4b87827377d2be4bebfb1580800
SHA19b6be1d5d0ad49142f47caa080d3bf5dc318d132
SHA256e068fa4fe4ab0a29ef8c9d417ce1613597c896a98fe6165f059b3176a6781a4a
SHA512b47b5507260376dff355cb1531a66010edf5a7c032e826865bb0e9a3cce9b81202588c7d96fb336b15d035da25b128f3f69659b65d3def46541f12fca9a42977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebc62d3142e4e7e2dfb9dcd45868b7ee
SHA1ee83479096809a89416ed78615a7e5dbd9bb2493
SHA2565c0af46b675fb0ca935f09ec568fc4447aa7e2d175082e19592553e6ecba376b
SHA5127d7052081d5b7b7c40dcd6b6b3d895667108b49b09374dcbd97eec3c15223c5952659273ec5a43addf16d0623783dfe4d01c63066fc217b80b346968a896667b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b