Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 10:09
Static task
static1
Behavioral task
behavioral1
Sample
12e52cdbe5ac0a8500165610c81f0aa9_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
12e52cdbe5ac0a8500165610c81f0aa9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
12e52cdbe5ac0a8500165610c81f0aa9_JaffaCakes118.html
-
Size
16KB
-
MD5
12e52cdbe5ac0a8500165610c81f0aa9
-
SHA1
d48e087e6cf2d5b7ea09e977cfbd8d6f1fddb6fa
-
SHA256
e0dd7e9fef100e97e1300ee7b54b0673b646c80fb45c029e1cafea328cf96144
-
SHA512
ab10c7d068accd223bfd170af8a944dc01bcb05d39cb8cf77f1d99661e0e78f678d36b9953c0fa8de25a68c7004676327f4ab18fe58ee9c1523dbbd1705a10f7
-
SSDEEP
384:SIIUypLFIpuiti1jFHj7NyaRkfdbV+OjmgTZ8G1RsXCGFo:SpyuitAvNyaRIS8meZHpGm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B843E721-8238-11EF-B233-C2666C5B6023} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000098e05b6195a60e4d8b2acedd9478696d00000000020000000000106600000001000020000000f9fefd8459c24fed2fcc1ba91e77b46b6e429a685e0a173170d716ea3766c78d000000000e8000000002000020000000cb3bdf85e2c97e2939cefcdf5b638baf4bd93f06da7839a706dd13643993e3c220000000c108c9fe4ca57920edec8fbffa8e039a4a86aa92b0e14247152aca2839535f5c4000000072787697fe426e0625af58cca0897ae82acb1ad6e53fd7698f01fe818718c37f9229e60ec60796b3419fbc2458157288421edd4c279b1bdd17adeeb229382eb8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90275fa64516db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434198427" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000098e05b6195a60e4d8b2acedd9478696d00000000020000000000106600000001000020000000cd997705bc1cef6294fc5f45d40492b0047dcf69d040874d3590a795c22cbb14000000000e8000000002000020000000c4380dc961feaf6945f48a2d5e1b9609959f9740f7a847c4b097cb05824f5810900000003d9a852435c2eb1c0ade2bb9c416e18fd6765974450975ea591d7ebe4c80e245c16290c378ed870674cdad1857649a7f5539c5820fe8f8d74bad1a74a9ad2b4afbfbcba27155358caa5f670213d8a3d4f10053657c564acf86fa38a91a808af33bc7464fc780e95963d49f38507756826819ef83348d9f19b0696865f222a5d6872d00d3c459da24e08a533810eedae840000000a7db768ff2800e64bc9de9f52df66ef0807ae2dcf089f827b61dba23ac3c1fdf3257954dac7a7426623ba722128b5bc0dfb94281f3d9bd1884092a9bf1af79b4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2560 2188 iexplore.exe 30 PID 2188 wrote to memory of 2560 2188 iexplore.exe 30 PID 2188 wrote to memory of 2560 2188 iexplore.exe 30 PID 2188 wrote to memory of 2560 2188 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\12e52cdbe5ac0a8500165610c81f0aa9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a0e54c8399e599e4d149588ee3fe7f6
SHA10ccfdb8890e6c24dd785913be4fb872e63b18e18
SHA2561572929eda6de81f12b82f94e7068a5f7b508b8b4b6249233964f3fd9b280860
SHA51241469f6fc314fbdd731e0adf050a6aa70e1c0bd1c70194d4eb3e4437469f644bc70d03b6b9e3f7040728daf39835bd836721ed35b9c7fd7ecacb42af8adce63b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9a4c7e9f5a7f35fdbaf72516b00ea29
SHA18ae03ad05db3ad4927d2fd7e2258133b1fd6c33c
SHA2569e4b03d0acd28f0b92ce8035bbad149715262feb483df347259f6724e2eb571f
SHA5125e1cfc42250f28642adaae6526ab8ccf553f8b5418e8954955af79f50088e2f8442e50ae5fa9ff250b4e7da137e62cde51f208ee0b9757aeb9fe9a2416676e18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512e2f3e9c4f8130771e3ade342953c47
SHA1219e011003c87ac36b81c97700cb51bc0550a741
SHA25689a544ce469cbac8d86a77f741b9ecf51535f53e015d8ea92b5733d68bb7c0e9
SHA512b1b0ddb46422de90f65cb719d7c526be5734b4af6e6c41c6f2ceb6af65ef5a1acbda96d3a9c20ec4e8ef7d89d0281d6816a87792cefbd7490d63bb0b980044af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9c4519b91dd4a5d70a0cbac5ea66fe1
SHA130aca8ac8d1c5b6c21989b3144b8195ae068bc82
SHA256e60f87435145b037f05683cca7342c72a280773e1e2c4f0252b9d96587fa1d05
SHA51249d846bd9b5bff74695f1bb868f4ec5446899ca26497f32369d5f43a03d09c39c552419d8329b84158e1e77693c1c1b8b31504339f45793c19c4e25b05af3b22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b33c7f493c8128145db5c7f1ed16b374
SHA18bc8da187081a1c2ce777c032d3e1ff713f15fbf
SHA256d1f64823665f422fc4d302a0ed2e6e09e456636818bd3318a1aafbcf51913599
SHA5128f6d012169fd93c4791d68e2f659fff4ea60db5a4fdceeb6e35eb06b48bc2051cf0a81401dfe0fe708944db764278149289a2d2956e670ff0ba2709fa8d5e430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593a776cbee3c1f88d52ab3053d5d7092
SHA1d1da9680071d6f5a98cc47260c1137f8131f0740
SHA2566e636accd639da350ee3d0197f3f92f9c9fea7a7bf4f9499a1afb1e16ac796ae
SHA512f12c0adf264372f0e1d98214d182c5f1c315cfdd8667169a870108474ddb6ec49a2c907a9f0605647e7b04f38f0f4fbf5f8f19da0bb825619d048dfe3291b339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5638a05bd8e404540d5f11ffd0171eb3f
SHA1543af7536c68d5c1427a771da8e276e9e409e13b
SHA256fd592d99320eeb0703aea2ea967a93167d8636411d26c02e44372a5b24f13fa7
SHA51214993da4d974c087a56e5f1638f51085f798587f6f4b95fec7dc832b7b94bffdd402768596114b411712cbb3d2db77ad3d28788ce458f84259702a8832d5cac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd02dfca76bf9deccaac238e6a401fea
SHA155d3b9981fffefc8b91218a61f21d455e366fe4d
SHA2561694a14feebc3695452efc7e42f49427f9eea0923e35aa62e030bba6c1c639ab
SHA51249c883d751cbedde9a3296ca68ad0d13c46f10c16fd0ef5c7845c2e5d4d41ecb46268d142b2977fd1fa824699bb354eaadb5a2b21627f524098f8715ef751f8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551ebf6e25edaed6d9962329c741cfec8
SHA1269a4f598987cfaadc7ec996cba6fb1fa3d346f8
SHA25632a8a3c2244276ddc364c65b514778906cd4eeef84bb6f273c1096221c083d3b
SHA512abe9286f60d17f06b861b21ff31fa0381f42d213aeb23df75538f12dea73a94a28ec9c9f06aaf4cea17286e8a2f2e239c2f5592f53f0906b0d8761a9a176b2ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b413c5bffe96ebf8098aac187979cab
SHA111dafe3e24988c7d444e10a95495514d4a7427f8
SHA256241ef095d3af60da6f1623c38d930edb600510aa16849a309470ed4729179c83
SHA51299efad7f02da1dbf30b32167ea6b266ab3cb58e5f1a8b0b5f8dc3098b8a01ec83530b407a6bf0fbfc9b23a5b55a1d8abfc9541cb5f8e0cecc73aac399e93e8f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa81867efe29ad402d3f4fb43cf2a6a4
SHA10839ee547ee4df7e22503dc73e25ab1c40ea6e27
SHA25642925aa3eba1fb7583a9ba19a6065c5408291b4a10e938ea3cd312e9dd061dff
SHA51289370f5484ee1296541e30f54b138df1c78158fdc319094e8b95bdfbdf7b9de4e8be4eba4be72771a38e85912667fc792356ed3e00e39a1b8855d66831053124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5564b2ca04e194184a94f8723c6a2efd5
SHA1f9f517d891db41dc855c4205f98a631f74cfaa07
SHA2561a1383c653e016108bf0b162e23c92bfb66311f71b793ebd61e66d4a8989738c
SHA5123b9c61aa2304812ff1269a02117351e9b8aaff847a15dc0ff372f71c69897346b90d76393e0e6b6d7d6d92a8f9ecbf215b382abcf4a8ae4b92d2fbcd108e924a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51da4b921cb1353388a83f935e3e83cdf
SHA10423e3a6653084f61a8f418ac54ca909b5d5387a
SHA256b82eee13ad3f393d65eb68b2a56f18cffdaff52e0dd2d28305e65084a5f75ecf
SHA51210438f0275291d3841dc4d335ee48ccc2f5dde13acfc45ac80b5dfe2d18a0cdded0fcbb98a32d69bb3bd63986053f4d977b855d2f9b373d880bfcc1832a80d3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530dec93520e5bcfcff052cfa0bf32f75
SHA12fa7379adea97ee61f588351e51cc02d0555ffe0
SHA2565bdd295a483b349e6e307cb7a384731e1472e827c2f93cfded3bf6224ee7b344
SHA512d07d5125319dc229aff016ef8547f27dae2451ed9b0b774851d5e48ee513a749c9bf33b9b65923cc250761509820edccf39fbcdc4a72685fbbbc9c0cdf1ad691
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582e831a879d92a94ccfdaebbeb12e7d1
SHA1db52a850915834858f5ecf1f33cf1099e83878de
SHA2561f826b8ea06feb80120eacd286cd8c372e52d1d3a91edde1a25519b56d4a3fa6
SHA51231b87f7244c8730e9784f54c2cf65df94070fe5e063397d2b7bc1011278768536cd64a87b34d0d5c771e35d5fb8a910c6015e99c771c8eeec0b7b2e823c49683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fafa3b4afff7e5b7858631da29f4384
SHA110dbe2530474c22c8eb4c794c93f6338b86600fe
SHA2564bf230c296641f2418dde78f6586cba0e4d63ff8de38ab4a253f903283873555
SHA51243baa104976d54f8b5f4827805292739b48ae6a258b45f555d4b7436c9e3fa4eeba0eb368ccb1dcc7714ee19d94800e35d10b23409325b906d595ab91dbfda2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d77cea648b321853aa80a208a9256e8
SHA1da56c42fadec86ef563982365de97bdec5d22892
SHA2564a36dc59ae4ff7bb3730c15a0c8badf82e305dfbc44d5d806a7e4b613d928596
SHA512efbcf55f65288b8c87fa31d68fbd2fc4f6e22b63a70d5f03dddbce4838cbd804c107240abb0b5e46c89eeda71bbfcb6b2143dad625dc7f5cbca5657c64e29444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af485173af4a3aae34589b267a38af0e
SHA11cb3c4ac7f7cb5ddae6f9122ed7ea93bda753cb6
SHA2563a2b4b6f0513a7884b166330cedd090b542e813eb357904c3dd0ff24edd6ad6d
SHA512f2a7676faf1d8e0114ca78579813d79dc0fdaf9a7e340ec72b28b75f41d024f0dfc8267cba7191dd1827519306b07ce4115385fb86e462da49e02fd75d63ae87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2bc68efba5f3f32353783a87b311e03
SHA1611f39f2caf62714e9f89ace16585d727fa986b1
SHA256a9c04553679ddec5ba734db3ba22a972a03695a5e83973b33fcd6f15ccc65135
SHA512f94e91a73b6e93091044a69dace0e0648bb7d79c25a0ed3fe530e83ad849d0bad1018be391364afe3f02b509d05c9de9f813e7b839e38e6e92e87ee4be8ecffe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b