Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 17:13
Static task
static1
Behavioral task
behavioral1
Sample
143ab5e8655dd6525e6c0af4acb5a834_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
143ab5e8655dd6525e6c0af4acb5a834_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
143ab5e8655dd6525e6c0af4acb5a834_JaffaCakes118.html
-
Size
6KB
-
MD5
143ab5e8655dd6525e6c0af4acb5a834
-
SHA1
500e8b893abd96deda262797fefd9e39d9f4809d
-
SHA256
be22c98e8a51a261a24b54d6f3fa766374a0c0015ffa8e6b082472118bcfa426
-
SHA512
641c40d36645527c2f4ac853c06a9e35589fe26c23f5f1b3ad875e9dd192152492a596926d2d254ab5c48907f5eb21bf11e2f3c4e1b17713c0a23b17af5efd0c
-
SSDEEP
96:uzVs+ux7bofLLY1k9o84d12ef7CSTUI96qmJF1vcEZ7ru7f:csz7bAAYS/PmJXb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 401200c68016db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434223860" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000005de685d64b4ee9f82d7deed7e1e9ea8659cf59552d775c0b434e281ed14eaf43000000000e800000000200002000000036609b7cec4faf22d4159fd8feba8965dfc027cc58aea82439a48df162e4fe872000000096c72f710db84f0d848006390f6cd31075b7319c9b4bb7259c6f96e9ff9f895a40000000926fba8d3f255fec35a8409d42ec078b32b84a0d80fdfc8b5f4402f2d140017d7116bf506663641ce1742acad30c58f825883341c56cacc74e104aaa9d6ede11 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000002a950d3a2570b551b56ff2d7e56ea45a44a0912ba02f417560305a6346699497000000000e80000000020000200000001a8e2facc726cf44433ba5819497937cd3b521b5ac262ab182a4b3278859c2b490000000050d75e4b9d096d55839c8caf6ff97c834450c03464213f21cc0532f41ca50d21243a65e6bf9ee2b76d22f6502bc4fd2de8f1c90c79d7b5348c65b7ef141d1172becb83fcb23bd09a4ba651eb7c00c2a6f15514c91011f668d73754be0be9b4e05e1909fa0b5239882f9caf77540c2955a6bc44459c3eae4b911a70e37f16119c7b52caf8567908e9c5e695272b455bf40000000c3c301eca24626140be6a67e60ae7e1a1c2d2cdb058f53421cf968ff4a85ba7a09ca7854a04bd622e48ae7ce8da8eea2173aad3c0e5ae384d59138dc39a6c8ec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF846D51-8273-11EF-9D58-7EBFE1D0DDB4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1244 iexplore.exe 1244 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2524 1244 iexplore.exe 30 PID 1244 wrote to memory of 2524 1244 iexplore.exe 30 PID 1244 wrote to memory of 2524 1244 iexplore.exe 30 PID 1244 wrote to memory of 2524 1244 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\143ab5e8655dd6525e6c0af4acb5a834_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1244 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50942c3ebf3b16bc99c7e0f7d81502ac8
SHA177dd40505fcd3a081b579f579a8be072d51a0f52
SHA25677b7c7bf5e6345c8dc6266fccedc3a98d5bcb5ae60d0c697346198698e572950
SHA5126663729fe8ea6fcaa1d1f2aafe13e4ccfde06de66aa7246987bceec5d422f2fea6d505186f91ce1d6c2355dcd9731f49d987dc72b1370a5482dd0f08d870d1fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a1d882ab630d96b3aef8458b96457af
SHA162319606ba0c6261f193896f767f016dd8721ca6
SHA256fc2bc1c0196981a83b6beee97d5fba7d92e292bbd6006770f06c008c43b920de
SHA512951df6fd7322bf0d7e70e109030e89720dcde0fb78de50f04edeec30be55b11fc6283eb2cc0c3090d634e7205a32cd4568c6a645b872a8222cdf16d699c42797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5383957c91057d2722f4efe63d6655123
SHA1f45fb72629befa1719afcdc71bfaf9bd1d87bbc5
SHA256f9aece07b98a1e71bccc437b4564dbae363346deae260cd6b6082f61dd1ca56c
SHA51249e504dac67b389e6812395553d0b755f809ef9a729dadc9e11c3bb33e5a45e2d0e058ef193335963c0e291c6b767010e4f4a5d1dbb41201f3bf7ec9d9f62c75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54681ee9daf25d397e407c960cbedfe59
SHA12dacbe9d0da3d5d77d5772481886e797651f7633
SHA25661ade1c3a62afe8d783ca20e9e80300094d70efbc914445040cb0b22d5eff942
SHA51280a1c9c38361da648feecbb591d2154f48468fcc6c9d11a586e299b9986fd7d42141dfc2128e41b78dfffbb031fd6563914ac0e92ef7eb8262adfd66ddb25459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580f4c6f3747fa328fa9d7b9ffc8d0e16
SHA1599c56067a74a6b73d0fbf0f5526294def4784fd
SHA25620db89f25f6b9381f9f71c0a2c18e7f890184987556fe7394e9efa2333afd626
SHA5122b51cd4e02f2d072633656838ea4d187093903de7ec50e8335be76d3e4685e19caa9e2e722039d79b6d2a3567079f7629d33acd85baccf148be09baadbc4f0df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554956f91fdd350693fbe2adb20bb9b3d
SHA1480ed864ba841d9273b717b291a7aceaa1c9fd44
SHA2566e4876852e08ae941120c31045a39652d6f23dea33ffe14e92c490f80beb1a9e
SHA51213b40b94b42f0be3d0fc459c2f9292fee52a69f0ecfaac95447b27859879ab5e13962a5f8e3743ac8b86b90ef889540636e6ed7c81b8001dd4ca569ca0a47816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9249a433e23e6680a3d1b3f8e339474
SHA143901348152cd1879fcc4c4a8f737008be95a664
SHA2565e14fb45a65683f07e8ea2129b4d9d7f037135a7a7d0f71a8abc9b33e2f9f6e3
SHA51261ab02b822b23435e7d6a2808838cdecd8f3a0e8ab40a7e5e5ba3464de1dff2ffacfd94f10faac4377c5069ddcd66e2133bd3e90ff688fc75382b78e44a4fd3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c0a15fdc9b82eb1a9582dc1fb0e4d25
SHA13bea1958f1eef52cb8cff4cbcd001f02d5118654
SHA2561489e3a6866b9cdd66b1bedbc4b058c6baba6c2bff2cc7e3c6e6f7775f6d59ed
SHA512f7ed4c0cea3b5be5f689bc451f536163584adbf9c178c6823d00bda9b74cbe403275f22470d9e14bf9d90a557f7d60ab7f119b5f2abccc2a7a1c767eeeacd878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ccf1a49a10dbb59e8be537902bf126f
SHA1877143c702b91317dae53e44ba654e1e3ba30aa4
SHA256a27a6af20a68b3529f49e2f713ed21392a8104405b9306cf67ef64a611dbcdea
SHA512e8faaa5c37cc14b4f1e52b572e25d5cfa966b217dedbc7dc8f666d2765521b6dd37ce2025789ce2cb5d2dbe7a71c64a153c2f319e88cdd1f3a99e1749bb97853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed3bcf060acbaa1be69f21f0c0f561ad
SHA18376d2344be1c6e4422801cbf0757c7e009de495
SHA256b40990feaf1dfc7c36371a6dd5ea8a85c2a889cd75649e6161762180fc46f29c
SHA512d229f4b53130f8086274840be6b5d336c385a6983737b78adf18f5a441915889c1615bc20063f43e7ff5d6e0db2118003dcf1ccf177dd67afc73dc23b3fa9863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fa0c7c9773d43379bd7fc802e8b5067
SHA1ddc361f8ff83e5dcd6a2a5488570dd9fe7769de3
SHA25669c1dc7d776e5a213bd316c7446943569aa49cd2931791f31888ecba16295761
SHA5122bd99c541a15b7f9c2ab6961cfe13dc0d20dee3cd0c246d66769682340ea4e63f1bf7e1cddb31e004bb18cb8f90fcbd5e14c0442187a9a87eec58a7f53a2869a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f701ea4d48d0cf1500b4337cbc8b927c
SHA1e59a143236b63b5e29ef23e7543fc6e58d6a2a22
SHA256b7e570039b821da6ccda2eb4f32a9ac29448d1a0b8cc16c54ce0f1da486fd68b
SHA512e492c9aaf32b33054479ba5b9a7d929bd758ef5b35bde732a9c1f5323af85002083f845dd3d4b98212927827090c0d634e0510c650ae37428ecdcadf478b151d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e8834100a8a49e72966774e8487dc9c
SHA14e1b61ce23b96bb266d9448be28b96e52b8c2e6d
SHA256ab0d735b50ba4fb50011036a5190bb833ab5499ee9e1ec769eafe520589ffcf8
SHA5128cfa075103f336fe85a733832f0988b67840d6ce612501304327e04e2dd74004603255c70ba7433739fcb42e999c6e02cfda00dbba9a7b5e4618198b3b3256d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59598098640963b511bbee28f34ecc323
SHA172b16d98d4ae17188f67e2c9970b9b7064a88c71
SHA2561cd3c6029ae55787dab4b576185f2619255f3f0dd4d950549d854981cd96f08b
SHA512a931a1ad140cbf41758f8ebc8a60d8364e75637d70244b59614ae65b1f92e98b2bb8744fb1211cd9f380e88e3cb3b5c75d937cbaf90e24f49a01eb235b3a3b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50622b0fb57f2c54ba74a1ad6b0547db4
SHA1369ce7a20a2e6fb3174402bcd2b8cbffff3b73c2
SHA256e415cf149e1924f6bbdf21508d0278ba32b2acd605ebc9cb604ff52f040ade66
SHA5125571e714a08bf81b92bc24456688ebadf1e6a2fa4a425f9adc4fbf6370712f4f2d45e10b7949b0720a9103826e01f1715c6ac7c529b93bd7a9dffc47b2b664bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5289caa3b297a084fa7233db03f723d17
SHA1add03806492bd97d668ba6bff055fbc0154db59f
SHA2568a1f8a6de407884a37be2f8a7a24bfd03cd45e8395ba0b798cdb08fcf622adfc
SHA5129e6a92259bbf30d810591b79f8a4fac2c2fa3068296f987052a1ab4a4ac3b210d6500e656d0fff5dc8a82686b35ee7e91b0d5b3037627feba7da89b77dc1a2c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b810c9ae4f0dc2092b96febfd388b11b
SHA135688ff738c05857f67a33afa6343ca065a795ad
SHA2565d9b0af70a03ec5e097aa86b4c7394348b10af996ac7bb9453681121b59367db
SHA512a38148ec33f571a0716ea5f156256067dd2be0aa3b2131a018d0e4fea35b4c5ca57882a0b1989f3cb1dc144b963c0621c939470a5077352a49a0fcb56dc2f837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df03e78d8838ef51e5f8d621ac32d5d4
SHA11971a016a04e1f724986a44b77cf9285055ee17e
SHA2563a1145038763ddf472734b01b7e03d1cbdaec72c532c06483ef0d1d35735fcf8
SHA51222ee47f72ec9cbbecb46fe97f6ef84785835e29df864732347c3bfed247d77c1629c0bc17cd8ef3b1850f459083993bbc8e12922b65a06b07d33a354500b5dce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52814f93f66d6964a0d11520ed06c6d21
SHA175c2983bc8b8605a9be92f9f4abffa183cdf9fa4
SHA25660d94ba673b84cd6dab96106d43acc8c8e52944376a5843dfacd702e3b19318c
SHA512964c04fb48e839d0f6d74558742be57bf5bafb2213cdeab9962b9499bb051472462db48b54ad612ec5d1364db91509f47fbad038c1c6ff89deedf066b6d3642f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b