Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 10:53
Static task
static1
Behavioral task
behavioral1
Sample
b75c2ec5de7d36e8efe243516b1df97f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b75c2ec5de7d36e8efe243516b1df97f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b75c2ec5de7d36e8efe243516b1df97f_JaffaCakes118.html
-
Size
5KB
-
MD5
b75c2ec5de7d36e8efe243516b1df97f
-
SHA1
d32db8a83550ee87c2c6dbce9ede5d5382425e3d
-
SHA256
f9291dfc38af0954c29d1ce461cf5035a63fadc0c421db31759ecfb4ef03f9f1
-
SHA512
2be9959813fb5250f10bb45c56d69d277ed14e25b3e34be4ce05c26d7b1d8555826d16e5a6e03787896ccf044328be0a9b24c5a847222a864915f6c1b9f9307f
-
SSDEEP
96:s60iozQqsRAgat1kOeUkImsjs/RK/GK3Np6PPeTFvj12uD0FbDxtiL8YnL+hRVrN:sv46d1kXsI/eaGN1tgFb2LErJZp3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70611ea981f4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D2F0CCE1-6074-11EF-BAC8-7A3ECDA2562B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000079160991e96480b4d351b6b83916512373d5e3a05563435b45a31e0d73b627a5000000000e800000000200002000000081e3f086b8b3fa5edaef21bdfb29d695c831e65c1cbe58f6e74be91485120f7a20000000d4354d8f0ce585fd8e78807d4cb8c06edb5ab8b321cd5acbd5efc807de9020ef400000006df048d184b6e1cafb3fe665e5392e71af74fcd5dc25f9d652f5a1897e1286056974087bd85e1b1996d741ffabfda6bb110570006f127016ee4a6c858e06794f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430485905" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000d1fb3a8a83c66c0346ca963e21b24a61b1b6b4c1387528643ffa596cbd88c58c000000000e800000000200002000000010efc0fbbaf815a8300b82db273690e1623b5ed4458bfdd64e8b86671d36602a90000000f5aedf890fde99a21bd3c28de979932f62fdc2c36ab27f8ae0c6f1327b588c6409d2f8ced4d2f4d3c9045881e84f3958df770c63e560128a1a63988b58d9bf78892a3f0e19e9f4d9fea604ff453382eb6b8fdf72033a5eaa1c63b48820a566fd6e76d2e24cc1254c8d0b6eaaaf6a3323f7052a956d159f0ab032f4cad3181426517422650f878d7daedbd977e8b8aa1b4000000012445414ee78d9bb72cc9629e9f5467edccdebaa061ecd4dad9289ba2223658286f121277573ca32add7225afc8cc9ff613fa51b016d5d1d30ba1ca63ba20cb0 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2444 3012 iexplore.exe 29 PID 3012 wrote to memory of 2444 3012 iexplore.exe 29 PID 3012 wrote to memory of 2444 3012 iexplore.exe 29 PID 3012 wrote to memory of 2444 3012 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b75c2ec5de7d36e8efe243516b1df97f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54be22b7e6e2b1f4555a67d9699b51eea
SHA1634efbb8fce9595e909d5dcb69d1f8154fabc8a1
SHA256808ba470b650cf7466e7cc60352e428a0959406f467c8a2adb57c9f11b361c5b
SHA5125300ae4293c00620cb6c6f2a770629bbf4df0b1e9d4233d0dacc928495674250b1b627d403ee323c6e4d4f8fc387ce8462a3fb974770a51049c0a245a936924f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b5485108ca00696897b5a04d19c314a
SHA18dfb22910ff2791405c63ef1ec44385df27d54ea
SHA256e4d20e224fb5f2c04d62f7f0ef2c51bec0a1e91cc857a06a33c0cf6e75143712
SHA512aa5879ffda828a9db8f7fb91c7b37f6a80467c5654606f9e79986c7ba1348c370ca14e279ec13bfa15ed6932115dcfe2c6da28d2600ac4cde8d06522492a583c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c26a5b53e9b7f8593357b37611433fe
SHA130c5acfc97d0039dbf34826536be164a9be98922
SHA25604b68a165f1557412a1a2fe7b4b567c373cacc6063fc24af8979df0f58d310ca
SHA51252701c9419fdb13c7143f5b7e2871f8183bf4d6b7a42b062cbce288f51e86b5ae5e651878046619a6a6d246b464bedfc38a782bb1e5fdd0ff885ca555932e659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5804e98cf7eb11c410bc15779d9b80471
SHA16061d711514dcce5c4e3a51e0dfa05f1e596b8de
SHA256297f690f3c14b4864b437516f101d536d9500e2ba09b705d878d897e5b02324f
SHA5129c2721830913aa8bef8ed1a3a2cf9335f59b9100b016296426369c8c032676b18d8a5049b3407e6d400c62d2dff467e56258ff82aa20349535b7acbc4d1ea5e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56974ef5e9716458bcaf5a4cda8dec3e3
SHA15a112ced241e5bbbb88162f7367e0dc76ccdf0e0
SHA256d5ddef807b5efbfe953ccb826f265c0100e54f4cc8a072c465d44bf5af184938
SHA51228dd24ba85901bcc846cc8068117753f0a71778747b0f6dc84d7cb44b17cab6526787f7b56e799631bd9717f5225fbba3e0e3e35152be7d07ccdb7c351a74615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5698dc1830d4688636715308e00c321ad
SHA1b7c1024f4cbd653e8724b1b5b1893e56cf5656de
SHA2561c896afb5ee1492e21991e5ab299362e74f43873b7a5eb25d53a2d7ecb5d745d
SHA512e9e5bce035291fef09c8b459896e06e1e3dade328b36b6f7092dc51e3408682e5d05959b0dadfd5009ba134cb329f5b83b8642409356168c167feb1a83cc44f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fd4e48ef2ad70cca47c497561c986f8
SHA13e1bc09edbd4465e925bf95ce5615446319811fc
SHA256d9a1a8bd982a21d4a7b8d35d81c1926b2df120ca07932ade0a308c947378abbe
SHA512da75c2155a8c9f9b7c20ac6c8428d555b82ece2402e5f401f895f779b5d0fc8423f64277766deff0ff528bce8170e0594e8767294071851d33de1207cd9bb31d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572204b7ef2cddfeed8f08b779904b7ce
SHA184acb670689e5029e0e5bc16fa451e029f3408f4
SHA256fdcf2dcd426119fab0d005b59a748c418b1abfaae97353b0e75e35fb1dade4a6
SHA512d0bef2ade975fdd948af1ed1ec9831b968483fbf723c51c7f83fd3918f8d245c4f7ca16184d683dd8531b28aec1ff8c65aa1b7139d29481626efbe8a834850eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54acf802efedf4cadd2dead2a9d0343cf
SHA1afc8b28f2a33970988bd6108cfd828530fc13b0c
SHA256879a99139976ddad04bc76b952adb1d3af35ca39c0711026247e9405a51c3509
SHA512402832a79e81ca1ff99e98f10441325975ca6a597f7d9dc6fcff8ec1511f4890431ca9f67b411390504db3348257943037ade3c66aed1a073696845b98887297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54add7acde36fbb7652fde2e214b67783
SHA1edad65e34d949368da0e35bdeab052e9eba18861
SHA2562377105cdf1f16773669bf285539edf02f97517899a2453b45b527bdc1e2b976
SHA512e77111c7a0247b7b63ab021190d6c56252e22d9c988419dbcfd6d20604cc092a67f0042821319d83e39d08ece0960b3549f480eab21e730a1c2550ea9ac75082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dc527342551bc720e8d2c1834de6377
SHA12755ab4d05b6be34364bd0a582c4a89fe6e8e88f
SHA256bfb92fb1c67cc6fe534f9532bdd27f8c4e8f685caecfe9c8afdc2876fa206025
SHA512d0ef8604e167e844f675e6a8f40add5f7a650d3a8fceb8f482877a5de20ec5ef91d6812c7b96faf644e7dc2fbd6c5af0e38d0cec0c7a240a5e842282d2050cee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4602e028265b1ca87b78707716a5fc1
SHA1a22bf7ee4fc0ba5d560e2a1791320f3d8d8d6a4c
SHA25600549b754a648d74bd783dd91939f93c8e01f79c8c063fffdcfbdc37da774298
SHA512baa15433d80991827d20b6b2064df2ff0d0c71dda941850816bd4eba7b1bb48e42de3fdf09cd1a05859fa8e32eb06997de1a426480aaa2c9658cd4528bd7b5f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5915e2dd6ac8b311f279800bfad1ac30c
SHA17f2554919832e900b5500a7c697fc9efb9be75ee
SHA256bb74a9da8281c4e45835f2e6068a6d81af9cc79b7b93457b16c5e85827776158
SHA5126e1581d7763292114e42820f4315f8069549a5a99807b8247ad53608120d116de5ce39b944f9559c3d94489e9041b76affbba46c6d4adf82f97067dac69f03b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c692b2ae9673ea38219b66d2e44fc34
SHA1862a889ec4b58045b186d168db35f6cb10402a40
SHA256c141151939fa4cc40dfdd81f5f9e2936c11f22bd561a45053ac3333d418286ac
SHA51231bec68b92945149d57c140912f1ea1caeff508cd1e1b6866764d7c5a7df097d3fb77afb993dd875d1d440cb157c22057c8553c7ad20f614dd39887dff84f75d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cbb591d33ff7a543bc7c8745d0a66e8
SHA19973ab2f7644689b4bbd2f1224fa0e62f0502287
SHA25695a12437456e02e0e75e8685ce01a6e29ff91c21c6016cfe0cf22bdf47d3e9b1
SHA512051091c161160b56a89823ca87e0d20bb0896acfbb10c80346d49183787781635b7aa880612debea5f8c7553d89ae6d52d4dc1fddc87aa1e1983124120e011cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ee84469f61afe4997c098e6c8c54d65
SHA132d6b779700970605dca0166df1eb2c823f7fb59
SHA2563456dff4b98b20db3caa4f6768b590e923f1f5f925ada0585493dafa8824706d
SHA5124dd610b60bc4c57d35f7fd47575cf75b5717a2dca55339809a3bb3e1e5424bf204e2a060b4960f30fb8bbf802479e394edc6436adf2826b35d5acd819fbab21e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543d6e7bc3439bd1e9fe9260244ba37d1
SHA1d2e37d4d5426ce6e99929678a7e2b7c3058d5cf9
SHA256eec72f6525d018dc78ea86e00ad3d4ac44ce4d24e6c7fc7937aab6badbdba443
SHA512c733f73012d8abcb8d339198cd13d59066d90a9f76760c66e2ba749883111985e2d47cdde13cce7fb0ec34f45256bf7e9298c5f47957b81e128c97fca7744be2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e6a9a38e9874c75500def988096c4c0
SHA12c437dbaadda4a45384eae9423f72f3b8dfa6922
SHA256e60c5e27be8c7d09f2f0e5441eef79fca3ddc637433ca32500a6fbbdc41cabca
SHA5123f1dd34409f76f7239d925a2caa7963f5fb399041c5320e93bf831dbd3fba31d96dfceeac1d22770b4b1f322e806f7451837969707fa8d81b0665593a6b6de20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516247cad17ebf5cd7960186a9887f6b1
SHA1e1d685c799e53be366d63cfdd200c7eabd3af567
SHA25687b80a02745d82c1f1da074c901488299ccd03b4b06a36e06036137cfb18fd40
SHA51276d5ef4b20034b472248e3c15fb709c469e9947d3a53804efa12af2dbd7d12dbea54b901879424a1468dda6435a5fd74c8f172688f41a13fc8c1058994ae8f70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebd5e144068d0ea30e2ff63af91e3dc6
SHA1ba755b8438276a85ba94cc6411ab6a75b2284b56
SHA256d7c287576327772e4324f6c64079b7f4e09bc1e28832b9ecf7ba44e250dc4d8e
SHA51257c1b3a03df1a824a40f2b4ccf59ddf24d43d2f28bf2315e7f724ce0d57dc543b0214cb6579437ef8d09391cc96b6ab9f97cdbd46e7db463f71f1652339f01d1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b