Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 04:23
Static task
static1
Behavioral task
behavioral1
Sample
ddaa9b51890c98f5b7800f7f5995e33a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ddaa9b51890c98f5b7800f7f5995e33a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ddaa9b51890c98f5b7800f7f5995e33a_JaffaCakes118.html
-
Size
69KB
-
MD5
ddaa9b51890c98f5b7800f7f5995e33a
-
SHA1
a24575c28e7c5ce8cab6e49a20620f157d2089b1
-
SHA256
bf7b9dfa98566fdac364912c9fb42e35edba2fbf33d5d18038e883bd7a2c9cae
-
SHA512
904506b9b9d0c083c6804a49f8ecb2ace53a8254128aa1782982b38f2f6cec8cf5c061cb9d34b006032b972c80a40fae26de6d46f8dfa42eea1fa8175bf4cd6e
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sO6tjWXPJoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:J31TzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432363301" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000073462276c0d8e1cb4b58fe778d2d54e0473722242a3e8246ee52f682f892401b000000000e80000000020000200000001aa8a4d889c5205fddc48f23ef36341a9b60cb175bf054e769dcd038953df44f90000000dd8a654d2f340f20a90b0bb747fb5356c2338d5e38d37e8fc2dad4534fe3b49decb74672b8bc89a53a0edd5a7880faff41a17d9dc6a146d7b777aa4a748a9bfa3bb2523a3b9ca0cdf5fdee09848e490b8459e94e1b803994693550ba57d1a912b647cdaad923204756126f2d9015442bf1ff3a32ba4258a6452bb27c024ad2e433fbbf4d432851fcb4017aca201d48fa400000003a1bad7638e7278f58b2d3e2961fb74bc17cd6636b24fefca13c4ac29279c8c657b60b8ab91dbac3acc45cb6f99d5d6d994ae96b7d2c1cfc25caa65cbe3e68bc iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0f32dd19405db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000003f5c17008ce481b31f8ad6a2dd83627a92d8be4a4fd87acf55748ec420cadfce000000000e80000000020000200000008f1f1eb6fdeddf0728341a76ef8c17ad64dd7721c703e467a02de47a9c2651742000000094e3ed6c0f6627317c0b587d8b91f3e2b35a79f535daaa843a8ca45a444b812d4000000038ca282c2afc25227de2cf5023b2d1b9146ea8493ff452b72376a094e1cdb37fe59652f67374d512038b97ff6342ffc7c9ff501bc01bc2f3062f50ec6f87614c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FC7B3F91-7187-11EF-9584-DA9ECB958399} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2292 iexplore.exe 2292 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2940 2292 iexplore.exe 30 PID 2292 wrote to memory of 2940 2292 iexplore.exe 30 PID 2292 wrote to memory of 2940 2292 iexplore.exe 30 PID 2292 wrote to memory of 2940 2292 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ddaa9b51890c98f5b7800f7f5995e33a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b6d2124000f2c60d70d8c61290ddb04
SHA17a529a47a0e9e69e1f55b649a7e79c6d1fb1aef0
SHA256e94830d628988e910c78a4538fdee14d544d87e14c0dd355a4947ff0b2aec2a3
SHA512c933c6f2f99d7448e806bcab0a132ccf9d9c545dd82f00bbff7569b6bb6d3eb6542ab9fbcda4accaf4eaf174594731a5a89b38bdb70606d8a8476efed0ae242b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebaf0aa6c57db119ef2a5739bc5653ca
SHA124456a4f4bdad58e67314e969499448adbab3ef0
SHA2563b504b0509743128d564bc73fba99d2dd90a1c5bc7aa6245e947f3e584cceafe
SHA512e86129f6733ac0b9f19b4c4a713a045c297a18f90a967aa54d08eae51e593af8b7cb1fd0e74c025b8d998d5578fd6062cbcc9f6528700b094450f727c70d7589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d31364f6258a7ae2ff198cb85e26de78
SHA1c0ba2a7e52d80180cbfb6a49873ecb3b937e803b
SHA256a6cb73658bb3de82b4a4fd10ccea4650083b486369f3f9168ffa3078a24dc842
SHA512fafe8c83b13d506a0a6d66ac749c836ab56cb23796f820decaa6158ef298ecbcde293c8ba44588623a6c4872197e388b6f0b404307c7d98717b3e43cd9ca5a89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2f76197b423cf3f5a322cf3a273081a
SHA16993d72fe8532e2b030eed586e1f867de7a0fd43
SHA256f2273e68c3d32af8748d4cab82951b931c18bc60a9d2449b0b7f231f8580d535
SHA51257217aac45f2ee17fc43081c974050598bcfefcdadb6de0546c834e45db7eae99f54c3fb323dce2e43263c5f67257a70cb4f92ff0c3e8ef65b291fc243cb2f12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c199a1e6e0c66dea6054ecb75e9b034d
SHA176a1ca74e24545f6142f587d7c4eacde094babc4
SHA2568248b6e7a2530580ad7128f449b9b9e7ea179eff17707a46a0d9ff1619ef3198
SHA512a4abd85dc2bccf1387beed5dd3b065e32e292c32b6453dc98cff0a48bdcdbcc362946f49ad981871be29a2489f74480c5b11b529c7949073291c724743e47343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b5af99f746b39c940c087e940216549
SHA178b00427d53ec1764351f9dec6f49d09e2eb18ce
SHA25612a67bfc46cda0362c7a4c5d52e5bc7177897a73a3dc01bb9b8d45c367e19645
SHA512973e4258e0e9c527ad3d201e8ada1a4f50f876b72388e168730c51a3bb301f9141799766a9e442ff0c06ace610277350799ab2deca9a103af230f0231dcdbec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f906d8754e6671ad2065da1f53535f82
SHA1be7b5ef0f4419d5e147bf6675f1568834247fc7b
SHA256efe87808140da3ad4c1189dab0dd4f7c36e58f68bd7eeed1dd8b17606fe1311a
SHA512ef00dbe47bf63fe43780dbe92efb150bda8d3eaeabd1adff724693eeee5b8ba81c967cd4c455e434a2fe16ba2e75e0fca477a2b9a580d197f64e26fe45e5cafc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adc386ce524a9ec7b86a30a600247bd5
SHA124e7a9c296eb4f9246332b86a49dd3f2ba8a2b00
SHA256c8a91d19a1a3bdc351e033b825050ad9eea62eecf16b678cb725463bd9f90cb5
SHA51278e7b56f5b106e289a6cf677fbdcffcb977191dd6d032e4efe570bd13e5332d9f2c3cde450e43b1fc55f4ab81c1b9c6cbfccac9406355355353834c72d1870df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbb09201db8e35e2e8837de554bad0d0
SHA1ccbc8ab25eb8c76ab8e547a6b3164a58d0c526e4
SHA256ace65d6653ed7070524d375d87c94be39c6c6322641d321c4aa003b6073a0d48
SHA512a8161fc6ef93278e68c795deb987dbd10941ec28f38da7f59bcd555ecf9b067ffbcd6b389c36bacbe87542e6c2510793c8d9038a26c81ae402a12c24f775bc5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c43f21256cfc77abe8a1d8154d9354d
SHA1360a7ab297e457ca94bc278dfaa7f497397785f6
SHA256692aebee7d3be145aa163127db050ffa15c2642a1f70a42de017ff9b9aae7fd9
SHA512ee645fc172edc5c29b303a4b573f151008e23e97a611c538ec22ba0941a84a5c9888c86ea310ebc522a5a18429df5826c5e618c5544eca30d1107cbad48a1843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfede4f2f6dc109f7912f91cb2a1560b
SHA14acc2ff8bb309fd2d2efe66b13f97c23dff30105
SHA256ee01d4f9f61d8117f6ae9bb315016e1b866f1caa65195d3fdb1e0d95d907d423
SHA51267fa87cc64ffa2ee4a9ac2a948970f36e29026a11a88d5c67ac95f2fbc203a3d3cbabafa4eb5acaa213f58d5a9bad60a16f7123f9672c844b47e38a5f2ae6933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9df981ce5c55e5093eb6530c2368675
SHA16484eb7aaa6e26476d5b0ff0f577ee1b119cf051
SHA256b67daed9ef73b10ba649462df8e416781bac629860037522f1df40780e85a5f6
SHA5120642e28a5e9647556f0642787c41d28adf410301bf37892a77ae851c793cb94374a3a4fbf9410550671212b5da774cf191b86475a4972924ad7144c4c1240b9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d000fffcf58a9c6612d5ad38a3ad8fe8
SHA1c69358715c9b0ff4b2f4ad1ac6267e31bc4bb504
SHA256a6125526907723ed70feb8a86d228c852c9cbc1ad499eb546387134e5d05ed66
SHA51228bccd178c4998a4b5cde0cc0544c905946a14a0bacd5a80d83304e228fb9cf32e99a0ca03ecc218d41a7ceb2a2e0311dba5a91dcd946cfe4a6ec57a20a689ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531e9ba682c0810cc5246873a07ec8245
SHA108045b68deeee6ec98e233f3e5957aa68d3131d3
SHA256813b97c9fb94eb95bea99148e52651928d6bef63711ae653c8686812c997478f
SHA512304d131bfa2019b969ce16826487029b4eeda2de185102835e47a105e52cd319e81a6da19a58a0a94b525f95f6e4bba01d3865b71d64cf0b69abde4029a721d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df41e3df0297cf0ba1af72db89ef5765
SHA1bd091eb70a62f53b351850723b9fb06c9b321ade
SHA2568b99d37ddcb668ccc854c8828c2cb9edc0981d87806c575ce2cae46b00bc730b
SHA51252b2ca1cf9821cf54150d1dd87ed05bf0f9772067a1fda4b0425325ab06804141cb7f80ca09a1e37e51740f5739624ce4d68f9197c687c7178d17957cd3287bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502da3ed7269861570a8c63390d7f3702
SHA1c05a430faf514ba7f3eee0ec0ef1176d30cdcbe3
SHA2561934ebd80c18c8f95c0a44f8748a4cb0df6d53d90a5bc9b0cff88b9e90a95c26
SHA51219002114a87db6ca5e3c94b0a07ddfd27bc8b9fb5fe897eb13da5119cf6512a52226c5b09e1d1505e0e7297641fbef425dfa5f251b4c731fc4778eaa81c00e77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5079e9ceb9080173bbf20acb26e0ddc2c
SHA190505606831b958e9d4d839b88c72c7f68906cbe
SHA2565c529b9fa2efea5f9abeacddfbbf077fdafdf4245e88bfc9858037386370f2d3
SHA5122be455afe68b2030badd8e1dcaa0d7a9638b6d7cadf904eb9519e556d057cd45e96afa01f01cf7bc2a882c804b146a26fd750efc83a47c8616a15c8fba37ff82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0b65083f8968b81d45da30c4dede551
SHA13471c97bd56062cc156e4fa98614659cc043fb57
SHA25603c7dcd33393a3d9c87e66b1d657a9616a0e1bf8f3def10bb68f146b5472cf44
SHA5124a927e13dafe57a076f77fce1ca47e7bf190ec2fa313ce3c17b925cb6efc179720e80601872c3ac2a20b714feb7360a68f47999961fb31414ae38f55674d63e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588eeca4ee7fe492e2e9957df0330a28d
SHA16457cae254dcb62272ddb61e861e0ff5cee24b64
SHA256a829cdb5aacdac2417224a219b4481151b2fe7b107de824b4677d770070ffc7e
SHA5120ed37b029f4603d0cfd84078f35c2d2968edb3b4953c01cf8687f206a29e84acd2609621c18fcbf33d7e599dabfef7920df93ac3e360525f8b474c5b5dc356a4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b