Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 17:15
Static task
static1
Behavioral task
behavioral1
Sample
e0a65907d10ddb103324d85ebe07e64e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0a65907d10ddb103324d85ebe07e64e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e0a65907d10ddb103324d85ebe07e64e_JaffaCakes118.html
-
Size
28KB
-
MD5
e0a65907d10ddb103324d85ebe07e64e
-
SHA1
98ed82164e910b5e9d7079c5529a38795fb622a8
-
SHA256
0b4f4f1a24ede934e7cb3f0b63948a2516e335f089e62466630423fdc78cffe9
-
SHA512
8f4725b69627d588bc24152ffe5b1013a241bae138aa185f92165fdb88b40df047992ef788232915d6600d1bba4778a28b903f7a542173ba2809df878b20fff6
-
SSDEEP
768:CVZSsIxTN+xGkYITZdq4Zd1ZdjZdkZduZdZZd1Zdq4Zd1Zd21o:CXSsax+xfT/5noadxP5d
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000007ec8f785d53bf085c24597945c56b3bebbab446b359b463fc1e3aff90ac30071000000000e8000000002000020000000f8ac028fbaeb64adbba28a79c40ae7e3323565a9caee8c35e6dd667cc268d38020000000c717e3fed76d76dc94fab7997d03d713f46ad183aee2ed3993ab0deff1a431fe40000000126d05fdd6286c3bf42e402738a4a640a38037bb03273975c97a3fa91165e53a4b947547f4d48c7074ce6c2400abc891e9fd11daffabb0b9f5eadd727e5946eb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 605511cdc906db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000005efb535e40f50eb901f1a7b4ac908f862a023cd8acc7bc7a61e3ddf776f8fb77000000000e8000000002000020000000a1767d0bf8bb9a097665157c826916748ab1eeac9e2a6de6610dd9608bc0bdad90000000d36869abf5088dd7b9f51bdecabd476126569f2e547805a49480b9350e587d11874b31e12324db212ae5901d6919013af09de87be7cec4afb633074c0ec85b1b960bd48ebdd9cd6ed27d3b1e01e4e844914ced8a655bf509552b3a97b32e83bdb7628c81aebdbda8f449a51cf7a959be88fb49deaefcc4cb0b4c54df76a6a6d206fc99b6ed80bb58d7122eef7addfa4e40000000b893be3ca3e1fd4e279adb493070c553b2722e83982a89d137bc99d7eec8172c47da8e65702557d2e03ca9f9c0f291109891b92a3e2744d2a77a4313b2b8495e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432496003" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F47681C1-72BC-11EF-9733-46BBF83CD43C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2688 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2504 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2504 iexplore.exe 2504 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2688 2504 iexplore.exe 30 PID 2504 wrote to memory of 2688 2504 iexplore.exe 30 PID 2504 wrote to memory of 2688 2504 iexplore.exe 30 PID 2504 wrote to memory of 2688 2504 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e0a65907d10ddb103324d85ebe07e64e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2504 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57caa13fec8aa548254bdc941f6d3e301
SHA11cc1f2481d29c2119549f7cbfa52929c10853caf
SHA2560e86d1b34cbdfe4a65e144564d5e98a66206b6e60d6b5fb75a1788e15c00f692
SHA512b6e85225f4e29e31e454fa49fdb91311328fe76724b6850d466e9f5742cf8512f9dab509db60757f972a6a72f7e3cd3c35e61e03798aec59b7ebbc2f97dc6f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a56d1b3c27b14ba5e3d390fcb5601bdc
SHA192d97597d232f346c327251a79966ec26a23c078
SHA256feb3a38848b9bb7f6b95a56ed48cac52f75c948ae199572d4c1042c26ef6a86c
SHA512eea89fe55b776f3ead1b2df9c4fa006137a1bce5f7964daf7404222ab852d419e18546c01890ee59c73a989fd498feb7cd128ba9f8367ecca4a3aa62f9469ae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f0f0f98630f977dfe56321dd5156c1a
SHA12e32aefac4e4562db7bec9df848b227ff59a422e
SHA25621ec29a0dfb11a1347c4ee4ee7a8b60bc4644be4eb1d07ee7e98fc9b3ee64bc7
SHA5126a936360db430030efc5d471b6169c9b35e9a44955eabcb48d349586c0fc4fc18fd4e3d7ae65a833547e6db50522c57e54e6e4b5b2ab4f530c4c22d708704921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5417ea0c5379b6dec44093de1425cb56a
SHA14b37d8b8927c2433fd4159a8fdcc05a33b05ce12
SHA2568c4dc5c431330a03e328ecaa9fed348adade73f983e688ec97f2554087c5ee14
SHA51275902b2918c088c715e973184be7b84a8dafb333d0cba954d0c620ff14bbe8bd10ebb19dcc7544165161b71f26c097ffe758cafe9737f1976c8432a49eb0379a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fee045a93ed2382d0520f345ea24c209
SHA17fd7a9a17afd419b67405c02193bd5b90df8c149
SHA256b1270ebfece06f4202779cb800b4499f847a62487a15d48bdd69ae044314e5fe
SHA512718405143ee79a99331d4abb5aedd18178647426849f7e497b6a37c1ed9e9e57003347d66d877b5b175b6ca79960f310c6d8116a5969ebf141302b0208533852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5940365dc642f33fb69e57f7f96fb1bc3
SHA13dc2aead10c38e7014c62d5ac53102f7b1109652
SHA25679b27e538c42bcd339eb64d14a57b5df0bba4e085f9f808f1e8d7743aaf9bdae
SHA512c9621080a15d52183480a93b78c13449717b1946a8cf5045d6190c5fd11dc2dc704c275f42ef5b8dfbeda9b5afc9fbe11eedcf47aa571595e53eb674b3fec871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb9d07938a7e29022971021a42bfa8f1
SHA12d7dd065f6beb1af3f778c29abeb7e99b864e1ca
SHA2560be9687d3368367aabeca7346b50afb67a7be998aab0a585f8983f75f99a2a6c
SHA512433837631f0c299119f95c4e99217d5016dad781b70eb598559215fbe16de28d3821fc5709e5870a7463f01625006df8036008b6584b0f76255451421501dcf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540b4fba7fb083fd4c09aa42a054a2fd6
SHA191b92dcf52b822fb3e67cde3cd5a4735f0fbd5b0
SHA256ad4efb862531fb7149afb4c55a675f2250f52b8788fc72c6aabfa4037b98e103
SHA5125f8623759203fb7c9f381276d4652d541d7ea4083b17966c02715eb67daeb9f6313f8702409298727d949ca3d55df6e876f5eb2ca645d9292d101f3705cc0146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563913accee9c2b47fb63be5db59967f7
SHA1708c60af40e95ecc3b846c77676d5f6655d53bf5
SHA25659b65f4a69cf6062fe1eaf5312c98f0b1f9d5582884df0ce509b4a528b8c7ccc
SHA512f6ad2b45b87e328f942015c64d95fd1499665abc8755566b4c3d3bdd7d76dd4c98aca08f790eaa4383eeff81df7eb41eb4e5a7f0d5f45aabff11507f12c4d5ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558fb88be7c7b14ffee4dd0c73302c911
SHA177b4a5aaf77e0fb406cc6745cbe5a9130bc2a094
SHA2561dfcfc4c2cf470f2f8b1ae9412b566e97b4cc573d25bfae92a8f1a06c8d13683
SHA512858ea3a8ce808d33a77dc5d375031ec203a296680b17afebbfb5d488468941be53762896fe10886ce576a6cb6e37f1bf196b828547e00b3a429568eb2c6642b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a878154d15a986a856b22b6aa4c6424b
SHA1306c8725582b5a5c0063b97bc231b54801746c9a
SHA256817f8446ed826c1283f22a41ba4c20c088d9d4e79ef17bbd907b434148d0195f
SHA512077f7fd2458cd27a4db3b42b2887a25d73a48e1008810b51f742d7d505f19d8ebb23c02a37a1044dfba3c366070f9604261b32066e1fd78bd9a7bd4a48cc5c1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5541435f154ec3057c3ccfe541b753a25
SHA186c628c73ebd0d08e4811408ceb4280052b5084d
SHA256a819164dc88ca059a2c6873a8960d76e7b55559e3f697cf9b0aa9893a23f59c4
SHA5126dd62f7605b994c367e5338d3774eca6d5bdf325bd9f292c8b237e03caab48aab882db78e8939f8ef0e2e1ac403efbc26e6713ee0e53a7f062c54bac1ee872ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5430afd18c1151a866b05d14aec697c46
SHA179ea7256bdec7420a68b471b28e5fed58f7c6d68
SHA256afb42d7f76f5ad94858cda3da23a054a040a33b20ab720bf41fa7ee7bdf71081
SHA512300637a1d6d2b3f04a95391be2f20f5ef11ecc9a4e9b2ad0f570182eaffefc5f8bbb2db2586b2ad7635bfbc6b3f4c17e79e740fc930600e708252d7fcbd82ee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b145688999e655a55053ae15045f6ba
SHA12d9452ba2385ed4b08d853ad11d1ea787e089cac
SHA256550035d4f2909f0129f33c36ab2a8c36abb24f43065e7d36cbd9fb1267c220ca
SHA51239f0fa8ec44699cfc11eba293045e1658ac6bfac941c3ccd2c06b0e7304647f5a81d308790a1da2faa4e4c01119a9dcd53f8bf039e95bbf9087acb5c910cc377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea9e7f2e3c4dd5d4100631a7f687d292
SHA1d6df91e099c8f1eb6d5db64cdff7e758777b7b0a
SHA2563a9a9357d6cdea31fc0cbe4118e22d2b2d90402b89158509255467ea4c74e6ef
SHA5124f52d7b95d3c6de086372064e3494e57e2ccbd1d58062ea9571ed236c72d63564403a5da362f5b228036bf5c0f6e06d8c1339e5427ac6d2003e4b7f23613edf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed366566c1cb4d9b0c2be804eae82488
SHA1d2dcbb0e0ef2c2610a16690015fd471bfaa9adf8
SHA2568ff9c572b7ac74d05ee6059b0d231fa3fdaf0d736ae8604dd91bae3e5f9240ff
SHA512296c0cedb6e392c2805a1f8e1d0ff5355ecbc0ef6e43591f9a1f91e2a4557ef9f632cd303554c24e6ecb286d1a76c24ef21ee725e38fcbb4a44833261aeb1521
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5413fba1b167c2bd0ba94e625bf34a18e
SHA1956cd12b80c1583e5f00dfdb284f82c2e6c45e2f
SHA256a036dea2fb10622cd6cc2e7184ad3884f01727b9edaa2dd8e28b1f8db8b9ce1a
SHA512719ba0ab86f992cdde9d8ebaec79b85fcfe9748da6091db76f8422bcb0e93c9281d3e43dc920823b4de12dd4fa22eaeffeefe0e8f949ace91f17950aa0cce956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc08e88d7e32f36469a3549f0afc7bd5
SHA1c2f790e0a69632a41dc2751f7ed339a72339ccff
SHA2560279456ccabed8ad957918145c82ebcfd1f7f22cf479586f7d8fd786d28a6a49
SHA512a84f6174f8f7ac17ed6d1d95cd990927ef8d9b28292d0bcf4a2cf6f1a2cec5d31ae329b581d00216ee0260d0f4c5e9f6927e3075ebe9c347d77594d4360c0184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f133db9fa424f2da1a6e9af525fa752f
SHA17d61316f616e797d36b4622ea0945314c0b3ee0d
SHA25610bdcab25ae17274129664e98760ae741f60e9aee524b2d5ce42d674bed519e5
SHA512f30d7ffa1f4ddef54706052414c4e41c4ade2d46db9263307f936506c9567734d2afabee019201737890645982491b93b042e562f316c5ec8368b4e1e267d116
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b