Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 13:12
Static task
static1
Behavioral task
behavioral1
Sample
862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe
-
Size
41KB
-
MD5
862fe98a58bb184ae03f32d57936acdc
-
SHA1
1e4c5e602b806fb97fb2751d5f56573cf7f7ed38
-
SHA256
4471cd6949a04788d85a46e39f4d3f7211a0709998f97a88f68e40bc7ac04223
-
SHA512
61f40ee802d48c650721478db4bccfa770afc6f0efdf91d0608771b04e1503cad1eec65e2351f49b8ca9efe36e995ddabbfd45981a3582a98c37b3e8659ba6ea
-
SSDEEP
768:XNcAv+ZGdbIAqoIHinxyZPijUqyVVXqfAVugjRCC4p1DQs8BDD+vWaQFTe1:2AG2kvoIHinxyZPwUqyTTFjREmPScTe1
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation 862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation acrotray.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation acrotray .exe -
Executes dropped EXE 4 IoCs
pid Process 4548 acrotray.exe 3736 acrotray.exe 1440 acrotray .exe 4980 acrotray .exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe_Reader = "c:\\program files (x86)\\adobe\\acrotray.exe" 862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created \??\c:\program files (x86)\adobe\acrotray.exe 862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe File created \??\c:\program files (x86)\adobe\acrotray .exe 862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acrotray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ielowutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acrotray .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{69810F40-571A-11EF-9A03-4A4A300BA5D9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1037691789" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1037691789" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b02ae34827ebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f945ed72d44d3489ac9a36be9e2e8b100000000020000000000106600000001000020000000290beef7acfa8477311930ca3588cbd5f0df65cd5994e4af2f218f9f1a21d13c000000000e8000000002000020000000a217256bfb9495634c82dc5189ac90499aebe56752d4272d2fe7ccbc2da22cc4200000006ef226d40dc1ad296a9efc234cc6b2ca3d46c466c1afc00617b6bdf5635624ed40000000469c8fbffd3f52a8d84132a1b02f813864265dea668fb669b2a40a51242c3c5dcd3bcd7d7d9dda91e49ef4e038d0642750f0199a0f0991a48e7e44a2142e08bc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90de003d27ebda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003f945ed72d44d3489ac9a36be9e2e8b100000000020000000000106600000001000020000000673b61514027915dd2be968ca62cbe70d14defa915f722ef343fe3736fbe9c0e000000000e8000000002000020000000d60afae6e459d4d05c52f90f10dc2129b029e62debd94abff5e83a5cf1009caa200000008637679431d6d6d62a07b9ad25491ba13ea73d5101f1117e0bada628bd5b0367400000003d3f94e6ecf41efcdb7c27c0b9b9ad46dcfdfc9f6c6f30699941fb1ca5e9f752c6c119f722913b1a3a149db42256a0742f00011cc8ce679546f52464d6d2ff9d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31124263" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31124263" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 3168 862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe 3168 862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe 3168 862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe 3168 862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe 3168 862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe 3168 862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe 4028 862fe98a58bb184ae03f32d57936acdc_jaffacakes118.exe 4028 862fe98a58bb184ae03f32d57936acdc_jaffacakes118.exe 4028 862fe98a58bb184ae03f32d57936acdc_jaffacakes118.exe 4028 862fe98a58bb184ae03f32d57936acdc_jaffacakes118.exe 4028 862fe98a58bb184ae03f32d57936acdc_jaffacakes118.exe 4028 862fe98a58bb184ae03f32d57936acdc_jaffacakes118.exe 4028 862fe98a58bb184ae03f32d57936acdc_jaffacakes118.exe 4028 862fe98a58bb184ae03f32d57936acdc_jaffacakes118.exe 4028 862fe98a58bb184ae03f32d57936acdc_jaffacakes118.exe 4028 862fe98a58bb184ae03f32d57936acdc_jaffacakes118.exe 4548 acrotray.exe 4548 acrotray.exe 4548 acrotray.exe 4548 acrotray.exe 4548 acrotray.exe 4548 acrotray.exe 3736 acrotray.exe 3736 acrotray.exe 3736 acrotray.exe 3736 acrotray.exe 1440 acrotray .exe 1440 acrotray .exe 1440 acrotray .exe 1440 acrotray .exe 1440 acrotray .exe 1440 acrotray .exe 4980 acrotray .exe 4980 acrotray .exe 4980 acrotray .exe 4980 acrotray .exe 4028 862fe98a58bb184ae03f32d57936acdc_jaffacakes118.exe 4028 862fe98a58bb184ae03f32d57936acdc_jaffacakes118.exe 3736 acrotray.exe 3736 acrotray.exe 4980 acrotray .exe 4980 acrotray .exe 4028 862fe98a58bb184ae03f32d57936acdc_jaffacakes118.exe 4028 862fe98a58bb184ae03f32d57936acdc_jaffacakes118.exe 3736 acrotray.exe 3736 acrotray.exe 4980 acrotray .exe 4980 acrotray .exe 4028 862fe98a58bb184ae03f32d57936acdc_jaffacakes118.exe 4028 862fe98a58bb184ae03f32d57936acdc_jaffacakes118.exe 3736 acrotray.exe 3736 acrotray.exe 4980 acrotray .exe 4980 acrotray .exe 4028 862fe98a58bb184ae03f32d57936acdc_jaffacakes118.exe 4028 862fe98a58bb184ae03f32d57936acdc_jaffacakes118.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3168 862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe Token: SeDebugPrivilege 4028 862fe98a58bb184ae03f32d57936acdc_jaffacakes118.exe Token: SeDebugPrivilege 4548 acrotray.exe Token: SeDebugPrivilege 3736 acrotray.exe Token: SeDebugPrivilege 1440 acrotray .exe Token: SeDebugPrivilege 4980 acrotray .exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3528 iexplore.exe 3528 iexplore.exe 3528 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3528 iexplore.exe 3528 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 3528 iexplore.exe 3528 iexplore.exe 5040 IEXPLORE.EXE 5040 IEXPLORE.EXE 3528 iexplore.exe 3528 iexplore.exe 3584 IEXPLORE.EXE 3584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3168 wrote to memory of 4028 3168 862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe 86 PID 3168 wrote to memory of 4028 3168 862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe 86 PID 3168 wrote to memory of 4028 3168 862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe 86 PID 3168 wrote to memory of 4548 3168 862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe 100 PID 3168 wrote to memory of 4548 3168 862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe 100 PID 3168 wrote to memory of 4548 3168 862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe 100 PID 4548 wrote to memory of 3736 4548 acrotray.exe 103 PID 4548 wrote to memory of 3736 4548 acrotray.exe 103 PID 4548 wrote to memory of 3736 4548 acrotray.exe 103 PID 4548 wrote to memory of 1440 4548 acrotray.exe 104 PID 4548 wrote to memory of 1440 4548 acrotray.exe 104 PID 4548 wrote to memory of 1440 4548 acrotray.exe 104 PID 3528 wrote to memory of 2892 3528 iexplore.exe 105 PID 3528 wrote to memory of 2892 3528 iexplore.exe 105 PID 3528 wrote to memory of 2892 3528 iexplore.exe 105 PID 1440 wrote to memory of 4980 1440 acrotray .exe 106 PID 1440 wrote to memory of 4980 1440 acrotray .exe 106 PID 1440 wrote to memory of 4980 1440 acrotray .exe 106 PID 3528 wrote to memory of 5040 3528 iexplore.exe 110 PID 3528 wrote to memory of 5040 3528 iexplore.exe 110 PID 3528 wrote to memory of 5040 3528 iexplore.exe 110 PID 3528 wrote to memory of 3584 3528 iexplore.exe 115 PID 3528 wrote to memory of 3584 3528 iexplore.exe 115 PID 3528 wrote to memory of 3584 3528 iexplore.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\862fe98a58bb184ae03f32d57936acdc_jaffacakes118.exe"C:\Users\Admin\AppData\Local\Temp\862fe98a58bb184ae03f32d57936acdc_jaffacakes118.exe" C:\Users\Admin\AppData\Local\Temp\862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4028
-
-
C:\program files (x86)\adobe\acrotray.exe"C:\program files (x86)\adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\program files (x86)\adobe\acrotray.exe"C:\program files (x86)\adobe\acrotray.exe" C:\program files (x86)\adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3736
-
-
C:\program files (x86)\adobe\acrotray .exe"C:\program files (x86)\adobe\acrotray .exe" C:\program files (x86)\adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\program files (x86)\adobe\acrotray .exe"C:\program files (x86)\adobe\acrotray .exe" C:\program files (x86)\adobe\acrotray .exe" C:\program files (x86)\adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\862fe98a58bb184ae03f32d57936acdc_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:2424
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3528 CREDAT:17410 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3528 CREDAT:17416 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5040
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3528 CREDAT:17424 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD55165ada1b5cd2add41b1bf23e1761aef
SHA115248bc71c62223dc05956dd38c49d71b3db8891
SHA2566485e30e97c87e1183dba7afb4a601f57b71d5686d271f287123908d77d653fe
SHA512c5cab499de7ec17a0505f077f069305a0236e78a632c834ab8797653f3587ae2310558b8a9b34726e22b926000567709b43d26684d87d13afb440c16c6019f3d
-
Filesize
55KB
MD5d71a8640d55a355ce9c7c247dae523ce
SHA18a53469a9d80edba8320e7f300316126df8ef812
SHA25689b67acaef4de3e7128bbb46debcc041dfd86a10586028261bf203bcd7fed217
SHA512fa96a31a45007cebad04603966be8ccad7545e5e66ec3660d42948ae06036a9392135d533d6e8bdf21e94844008ff9441ea3fe0917be779bb55ea598bcf11319