Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 01:13
Static task
static1
Behavioral task
behavioral1
Sample
b9c8f08985c9a2f2ef488b0516dde4a5_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b9c8f08985c9a2f2ef488b0516dde4a5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b9c8f08985c9a2f2ef488b0516dde4a5_JaffaCakes118.html
-
Size
122KB
-
MD5
b9c8f08985c9a2f2ef488b0516dde4a5
-
SHA1
acb3fae7b040417bfd6450c5496650e0d1138dd2
-
SHA256
6236ad2d8ca8960b38c657275ea88be8fc8395f6991186f6b0eda327c0f3af34
-
SHA512
1358209eeb3e46dcfc882f6ec5084fcf53866776da25843615b179eb89fd4f5e63ed58bef927c6f72843d6473ee97a2451d8f76b55d708e2738d15697c8982fc
-
SSDEEP
768:rDxwbnV3Upzv1Yua5vAlNBIerI9qvnmM7u23J4ShAp3CbVFJN:nyDFc9m5qGwnmQu2Z40A3CbV3N
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ED6183D1-60EC-11EF-B2FE-72D30ED4C808} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d8b6def9f4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000962e379220262bb61d52970d9f8e4be5d8bdc5600c6d4de73ad106fda4b8bcc6000000000e8000000002000020000000ec6a6f9e9b46b787c06738deca02fb84e96e4169a1a3c13d1b0f8e302d0d00f7900000007e3929fb2c299e8d75be32529363776b9e30186050170a89bf670af047ce7d707ca0471fb534307dc97c69cdf196f323f615362aa4fb9f4aa7ef5cdb4ef3bebe43015089a9b71513e43ee41be7f68e8a6406e5e80349fc2672be672c5cb3e17b8ce3cf17f1c6faeaf1cddf4f13d1756f1594b14890628727cea4943835d2b4802cbba7833d0ecd30a1a8d3bc3496f72a40000000e66ae67100797ff071a553c99faf055a0ede00335bc198c48c6f6e3babaa2e26c4642f74f65a0c5b356d5dca4503ffbdac02597d20d563b62ea784729efced0f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000033a0f9e7a1599e7b0ee8ff25718193ccdd5bf45ff10f855fab52406ce39f9fa7000000000e8000000002000020000000c571672179018c0a936ad3bea1013c69d2174fbf5433985130ad792be12434e120000000541f09fc55e56b454a9bf8a4ead4748239ad70e7b3a13c24d5d498ea1acff379400000006f32d87f9476f699f438ef841bc498ba0042a0f4eafa468955fde99689640a05b221a64bbedd2d88d2cfb03dbe61a0a47d4bf284cb71738297f6ea307c80c61c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430537486" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2060 iexplore.exe 2060 iexplore.exe 1900 IEXPLORE.EXE 1900 IEXPLORE.EXE 1900 IEXPLORE.EXE 1900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 1900 2060 iexplore.exe 30 PID 2060 wrote to memory of 1900 2060 iexplore.exe 30 PID 2060 wrote to memory of 1900 2060 iexplore.exe 30 PID 2060 wrote to memory of 1900 2060 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b9c8f08985c9a2f2ef488b0516dde4a5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b740ed081cb12c6da6d1b76b655ff99e
SHA140d1c4ef328a8109a21d00c6706ea196e538a8e1
SHA2567e011cadf7d7873934e97dec981d628031f92c0cfec09471d1dd291121f9217e
SHA51236dd87fc7c52378cc2649deafe4dbbf5b027fa85c06f536efc6638a8b51fa8d7b69ba7b7eb1011490e8f0e47ac04ed34c634475c4dd889d0eb0213226b80118d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57c36929eb5e999ce1b807c47f89fb3f5
SHA1f93acbe5941ac05eccf6c3d3efa25f5613df3b81
SHA256857a89e9f07282ae9e2f705348462357ac985a112fe52002dfc0211437312814
SHA512ef3f5469a8cec71541cb4d82677cba5ea7dc94d0530fa3b2f953e95cc83f2c563cb1c3ae05b2d50ef54700f3aefcf94ba1aee48b7ae765f8037759b5c773a302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ed2b045da42322286d89b01b1faa7d8e
SHA180d8b07f6d36c8a189d9083273e3fe210461d888
SHA2567008b95d62588e8f1cca933eed6d7aee58d2b01324aa130e59ea832c1b2f7d09
SHA512dc1933b81fb3f8a7625000bce3fb8c2cb30e28eda2ac81d9469f04e37d9671799451f03a43b6fcf9cc6d88326f4edebfc865a4dc00c31b58c9d77e58d30fada0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5506a2405333753ce82867dbda7375b6d
SHA18cd5c6f8b6f1a51aa0f4e78fbd917fc3b657bab8
SHA256014f30bcf23e676692ecdacfabd5bb99ad3080aeaed0b660aade87c460e0887c
SHA512ba113eaf93685e2323b2ccad2d83dbfe164bda6764c1fda951eb1e3ad8f8557a13c9833508434a1f991faf0acb594c7004c15faf25431739505c81db8e71ca96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e76ebf92eaee0037d27a24e289a01e85
SHA1f74cdf68225054111a9808a0a8a06f124568f674
SHA256eee3a24eacd3da46badd2373f9543ad460da26addabc4eed89b0bbc13e667d9d
SHA512361dc2b37ff0ea5433c4d49ca8935efba6b148f7cb624044839824c44db87d45993f785e6a093af01f9433c90ec96f706688aa7e2b0c5cb3d4d2a454507db11f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e3b56b00e14e4300dc738fd3d9eb24e0
SHA175bab1d1e79af749b07970720f29722828fdaf20
SHA256f01ce4abe683c5bcdb882f5f135a962fbb838703746ef3c69d12d8090f8bd230
SHA51294f60d99cf99af19de4d18a8a6194974b358898a87a7cfe5fd7aa7127579b35d1478ff5e479fd2c1aa2ca4e2842f355773576632e826338d9a22b475e074e37d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5afd4b2a1c36e8e7701e7c602b940cbaa
SHA19e2768a6a618cf76ab467f74e9981e81e15e04b1
SHA2566773d1ea62c9746e9e602ae2d6561faad95c76cf53f0c3fe3466223d9cc88aa7
SHA512422f48c7905d905946c2aa50f68b50e0c04a91326d92ce01e94b9d9e7e508a3c1dd1c9d1877f34b6ed907032fd4d91af4c3827306d53be2b4a00fdb4bbaaf30d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53c2414d96090061e2e06f4164970664d
SHA17264b905848e03233983a926b238c1d6e620bcbb
SHA256e8a7e0430a810ba4539e8eb854c34ccc369fc368ac4ae788958af124e96d9ddd
SHA512a886655fa0fb02d4b3bfa6a7360afead0e8ed98d6f6a8625081fca5388074068a7ae5ce8cf7801f54e98002b9e6c06f1534ba0cd91aebb7e57634ece4c2a998b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5841975b3cb4f1c81991b773c783985ad
SHA1542a5c1fe43b16f444cc09185579797c70982595
SHA256603ce886a567922f29655b2fe63ba264db79ad1012c3083473597c860a440a05
SHA512bb9561c8bb69416a3b7ffa6af2a190607a87d4de39e4f434fab50eaa008001f353e2e8894927e75f88de45bea220259199b90e69749b65ced5d3124a487edb48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59853ae228685351190033d656d283a96
SHA1dd03ed610414a5550ba6119c76267edaa418154b
SHA2567c3eee58ec731ab4858a03b427717e2c256f597ce31d7e6234758122581cb0ca
SHA51227a96a34bba7b790840a41f5232a3c1e08bc1c6cd75ccadc11ad0395afda57579f1b6b80a399fead6d37e39c56f75b1d2c7be1afc103f23461e83f2ad994bd8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50052c01555cb385a5017668dc908e26f
SHA1cad05a45ad9d1173160affb4d71da8fa8315fed6
SHA2561b070fdb91bde165b7c23310efbc7dcfc2ac8821cd79ec979c2165e15acaf533
SHA512a9e428392957f8746dd985df63143c77e637f5757fa8c0befd5244ad6300b16c62a91d06b570ba9e231c5627543fff1faa824bbf00ee6bde2e78dc25b22968ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c979b7088227cb89c77e1496fef3568b
SHA16826fbacffda2fe6e895c423756b9f0e5f78896a
SHA256b661c78ca0c9a5a9505b54cd7ad67c73fdb6aec99bfe0641dbd7429cb0bf4162
SHA512837f594c0714cbf1afa8315bce6bcdc46487b0325c2a399b387c9a89f1f4329d5d9c621d0ad997b026fe73a83188104b93860ea176a67d390492edd0ba9d17f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD568c74e1f0e2962e293b8f7f03855f01b
SHA19264c37af7b8d14194779e46db610765491a582d
SHA25692a276d42343c069bcd9a7092ee8731784a9966aca39fabd49a80d6eb1777758
SHA512ad579b5c5515508fa07353b575811416a2a5c0db868ec43d6cd1354fbea718bd13cb031511bcb2f279e6c5f978e0fcc6d63f034fce76404c6c52a4fd02d41158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fc0c3f44771fb6ba6e4c3984a09ba8eb
SHA19ef4114584bdbda2c7137636842d07eebbd6ef09
SHA256cfbadb9915640a84b33bcf278b2edba53312796c99ee574f6879b113324a19ef
SHA512610db557e897354e1b4223c7c02ee8362b58d83771a690a2820486707c1fcc10dc3c95260575670760ec7b653bddeab24aacc3a7cdb485e1d2e1ccae9a2a2929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5254ab7a664b1be4768958e911fc49a37
SHA1c4a55378245875af27baabdd2f49871f33d214a5
SHA25671e553cd173f99738dd466eeb0f43b93e7b756b14fe1e5381a61d43e2b5832af
SHA512cc465f5c0a181d999755a622fcd21d4beb25a9ba16fb52e7d36aeaa9cde06fd3ef6e0419e7c042b32436d35a08188d8e4785fac7d984cd14611cb638ec356ab6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ef9c3071021301dd712ad5c223a50545
SHA1af4d515c57fe01df7b62cee1e275d77d363f90c4
SHA256fd563f329e62bfde01be31958d00b2e109c908324faf49c3ba5ef04c48d86b22
SHA512a23e7f2165b42a0bf1bc4d7d5ada8b335bc87e9fa3a3914062f23ada87a3430292cf1a14e2a4232ff0af6eceb3f5cf2da5dad5539ef071fe4d3e78c8d774587d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50aa4b423bc3e83e368d846c7a0e17b62
SHA1e439761bb0b94185f4c6ba989062c329acfb1359
SHA2568397ce49d2567870cb44a706c98390d86371b03606d56170db5562d293114cde
SHA512cd41978e64a7a3d489f7a77ff5fda230a35ee3bc19e5b8a1cbd8cae14f69cc049898bb1da63e5ed276423b48a3c45e28260fc97b645094e32361b6232577f157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bedd062608bb98ec90fdde6afe85d6f7
SHA1d9c2b9aa9566a43787bd94ad81220faf7865a0c4
SHA2561693f5efece1b6c7e6dcd5094c1783f9e38271f25e44a057782485151e0dc46c
SHA51204a416ad8c7d7ec9f4890aacf33a4debaeef226cd3a8f0fe24bd5a4fd5f4a2a8b6bbcc2e5a98e076e20d3e26fc5062598b330fa533d136537dba9559222c7af1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b0352a7c009d64fe77086421e02686d9
SHA126a7b1d08a07da5138a2e9f0231b665a556e6cee
SHA2565abdc40b8db270517d527b143eb4a95b2ba9da5183ae1aa2e26fd09474aee0f9
SHA51248ebd7bee9467bdb3d860205f2dcb42581bf50a216c6bb0a7c48b54931ff76a06e4a3c4c017da99bb578d08deae2f9f9f730a62ad9f32a999b0901b14bb1d23f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54af961dae7ef4ce0e1b44e5971d30d0d
SHA1c3397c93820bdeb4a38c2cd7e7819f30db406fad
SHA256688cd61c1160eabbd87ccea1952377df6bd715a3020fd9640a9754ac4384977e
SHA512e46e40054a7373a03cf8b5110405d6dbb0b79fca313055634066c7818dc5054ef34297fd3b6af4b6339f2a33af4633156f9610968b7cad6452c08537e2024c2e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b