Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 07:45
Static task
static1
Behavioral task
behavioral1
Sample
e2020e241cbb3a02d40b297905a54062_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2020e241cbb3a02d40b297905a54062_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e2020e241cbb3a02d40b297905a54062_JaffaCakes118.exe
-
Size
528KB
-
MD5
e2020e241cbb3a02d40b297905a54062
-
SHA1
617ad78197778cb0263c12e358cbf3ae1e370c32
-
SHA256
e023338a637465a046556a6f67700007e67e78431ed87349952b6d1cfa94a839
-
SHA512
7f0f1bb53b372ce37d5623e24ffe4dfbe8d6b1883d06be09521f6c5d1a9d0530b081c012ce39b41cda23414d6457fe1e129282b9adacf9c645fea900d406d838
-
SSDEEP
12288:SP6ys+NgzZhkDjh9rmxf5QlZI+5mmBbylA/cmFhyyly1:GBNUfk7kfDU7byW/cmVl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2020e241cbb3a02d40b297905a54062_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8BDD0241-7336-11EF-B939-7ED3796B1EC0} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432548225" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 400b34634307db01 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000200ceaffc8bbf87b611339f2c4c9e0d6cf067e4935fb86fcc94448f2abd38b85000000000e800000000200002000000068c3464df0d085dcc25e80b0afa757480f91e49d38d215aafc838c55956f9021200000009f6baeb66fe6b81e5ad8129fe60ac1d61ca38c96f20afb6ab1410155723596de4000000066148a9551f82bc01cc779e948045fa5b6d14c4ce8bcd7c79c91d0cdf4ad96ef3eef9f3828f22174644a84caff78e6d1d1b7279b308f9b7c50b7fd2f73cfbae0 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1508 e2020e241cbb3a02d40b297905a54062_JaffaCakes118.exe 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2108 1508 e2020e241cbb3a02d40b297905a54062_JaffaCakes118.exe 31 PID 1508 wrote to memory of 2108 1508 e2020e241cbb3a02d40b297905a54062_JaffaCakes118.exe 31 PID 1508 wrote to memory of 2108 1508 e2020e241cbb3a02d40b297905a54062_JaffaCakes118.exe 31 PID 1508 wrote to memory of 2108 1508 e2020e241cbb3a02d40b297905a54062_JaffaCakes118.exe 31 PID 2108 wrote to memory of 2816 2108 IEXPLORE.EXE 32 PID 2108 wrote to memory of 2816 2108 IEXPLORE.EXE 32 PID 2108 wrote to memory of 2816 2108 IEXPLORE.EXE 32 PID 2108 wrote to memory of 2816 2108 IEXPLORE.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2020e241cbb3a02d40b297905a54062_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e2020e241cbb3a02d40b297905a54062_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://6l.cn/s/tj.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5481720a7b9fdd46cddefe05996c5b04c
SHA12ac18484f15a771a23e3f2a8cac6c2b426a9064a
SHA25646b4cf1ad25dd2be05de88c3c48bd95bc21a40be4d50bd65a22ae2c38f534d86
SHA5129f2ee9e1eda759e0c514345078e21f9977bae0e026712c13dfd3eca029abdff5e09a0dbf3c599c2837ed1f5f3d0e63a476cdf956fd9e8421212436c2cc17b559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53db54934b7f86ef0da066844817d9b30
SHA1545443b6ebfaed5b5d9f828364607cbab11eac4f
SHA256a724d82ab20b1f022d21d668996a0e965f2cf31b4083f801150d00a3a9f70b42
SHA5126e8ab7581e188d73f5495ed02b98d4a4905d3cc46272816b7ab68072683eeaf759fd2fd06e1ceaa0e9a0b6c1829d0586a7ef016496eabc4c73ae1e4d2e9e73f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd96cb2d0fdea8086c1e7bf4a56c56ce
SHA1e553bac1057805763f492402beb160d2d04075fe
SHA25676e1899cffbb52334ce8052f1d391db93afc9f9849d9401e31c03450e4480a2c
SHA512d84af16d4cf19e9ceb7f509b816bb6378c7569cc54928af9e60185ab3ead8ade76b354001af41083e33e13a4e5fc7bc98f59e9957413b30722ad650207ef9aa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530e35ec1874a777a2feadb556d0df835
SHA1b6be97cf11c1da75044d52e853798fc5ddff45cf
SHA2562a18b621538de27244b440e812b983cfa5b2259d2f1674888a4a0d36123dc2bc
SHA512ae2763cf741a39bba7759c8d018da2e4d148a2fd4bedf3057929d36bd15b58d6e3e742c8422d9047b9f2776368e71f96ad4c44a78d71b06dc10f9f4492b6124d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea044d675c8951f346321cce20614759
SHA14d8319b55b6e518da2ee79e9887ac8ba27d70667
SHA256fdd72e746297611bda31b36be88f75c9561cba970f53063d072062458a773460
SHA512635e95eabaf1047f502a0dc00cb2dcb19833957e50d81498cea8ae288a370d55da0a808be0ec3631869a8fb3385bf18e9a1000b2b75f672c1c1e4e8d14efc466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2931ff37bfdc73da18736c86e0cfe2b
SHA17f4ee4114b97b5d3211b7afe70759935a224cd88
SHA256d8c390afc99ad2b13d85fb7be8be0f87922a6c947695fcaed2b9fe81496bde7a
SHA512648ebff327351b6c9a210d490ea53a5a150023d9178c5912017b42e2f77d1ab3de2a1a8770b167062a391a3d1a74a7137b3270a3392f15d0405a7e2faa1c651d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2ec2af9c4f7309ae07938a53e65520d
SHA12723146262a97dc1d38d18abb48c9cfaa69f9dd3
SHA25654fb1459b83747807fc66f520f5d8d48f7f106cf367609d7c920fa30824822d7
SHA5124bd78d395d65b15eef03a3307cc8a42b802083e2915ee320e5b4b6dedf5403cd7a26c9a5e801ed8605471dbbcd5bfbc4ee1c8d675979f21329e53357e34878e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50114e9c35a832ea53056950f8450ca06
SHA13f17376d06e879a55ad69f25f5e12515b8b9d719
SHA2568dbd81bb7b38bf438817c9be26014eedfc2bc372d9bd9b0873c1ad4aa98986c5
SHA5120174f6457cb7caff913ff58fbe4bcb14c8264c1153229514461cfa11632e73c4018fb9bc6a2113ada83c21e600678747f9f8863a6fb58d166546b6c80b071206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c9ee7e1e8a644686c6d1057e7af9ad2
SHA1c6a74fbf4118b406c30a470c9d20ce8b3d1bfa39
SHA256b2d656a04e0c76ea5d61980392573a66ec15df727458ea0e1f2814cf2cae795a
SHA51229bf564a9e25f1971ed332e3b5043caa8aa9c6c3786f2c5636b9f8f7d94235c4cd10cc495bb83c315d4e1ed96374536b009f4a672ce522d7e98be8e5fcac83ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516061d2d92b5277f7752e290a8289b4b
SHA104d28658f983f58c42795333356cfa6a060b6609
SHA2569d9e88ec6940bc6484f376ca91314bb41764b701dc85a44b76a3945c4ef3b772
SHA5122cd5be71f861f70731fe36240934633335bdbad4f71075d276316518453a43fea993fb516b0f3354d4a61aa769f6642a6789baab0bbf9ef9420bd38a245c7848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b101d2eec32f8f5e66081e2e6b13728
SHA1acf96c1d4300c532d3f55ac79e831432fc84a450
SHA256b9caf98f6101031dc8610b75a8127bcda782a2aae6bf75744092906c23a688e4
SHA5122bd398d3607e65d383cf138f1c943fb44e52b8802a0f903ef8ffb5497c31a42c6ba542a7b15358089e890828e40b733677ed6932811159864234ce8610682c09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bce64e1a68163359260a58f3c6c6faa
SHA1dcd4c7885da4dad3f2c55b093cd4a6fb4ac21774
SHA256c6944981ee764741c1944ab7b2e1e70f4d0da6e88c29fa765a4a40ac7b17e829
SHA51254b7bc717a9f686970af9cc7834e3e0d87bfd338bc2930208b83206f9ae773126a70349c0b982ee5b908802a84e94cd9adc9175e11255326314c7adc03e31163
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a080a7e8cf5f9bd6f42ed1f9d452e6ad
SHA1d96f9ff8e3ac66182d386b57ee4254b8bcd11127
SHA2562c271ce36b7fb75226591f59b7fdf6097228c782fb15aa56a93c4294cdfc069b
SHA5122a9fcfed9f7dd19a8a4987bac37f20282de69553807a67faacd97a435b62db52987e3e3337dbd633b725cb14255eb04d5d34ff0b3fe418b44e8175bbd987bb55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be8b5152b02171d84d8e734bb7890721
SHA1fb62cff08e0ae874c9d65615d19c11e004a8de32
SHA256da1f5e299b0d4953e10443ce40653f34c247844acb2e14ebf0dd879293adabf8
SHA5128a998fece28e6b15eefa4553a8c111fd783761ea8a294a0f65179b45e17d5b6ca89d1d3d003217fab15e931cd86bb8f1a33a65543cfac53c40a5086da9933503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ba940a106261ddcaa6b64627e68e476
SHA11ac909c2a206220af5dcd15e1e137ef08e4ef717
SHA2561cd39dd082f95ea79ffa793b87ab5cab823b2606be0cf252e5f07782c796a8b4
SHA512378e196d04a9bf5ef76cf06278da50cc8477bd931f43137711cf19b1dfc97c2f789482197fb067f5288acbfe351af96353118b060b1fba9be6eb7622b44b0cd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590bbcb14e9ef6884c1bce8d9fb47e19e
SHA1ea4e7962bddbe97f14bf06bf9351e9cf6a6a4da6
SHA2563508a89e08f7bb710e28c059a55fe37dd313484f094512a50fe7c3835b5369f1
SHA512f0bfcc5a64ddd173596cf8caf54389040f4a89fb0bacfadf3354164163d053cb9d839127158fcad13ef8c66668255304ca07c75089c3b3484781cc9cc4d9eabc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7969f84846e75b90246b857e81775ad
SHA15152912e32d61dc307c114eb378a85c5849257ef
SHA256e227102cf479c87608ac747b5920b004b55ce2579c70bfb2a06c8d8aa3587959
SHA512773db0f7736bbad0b6c2d803e1e40f56d55fe0af09086afd52146fe7c5e2bf0cc741187cdbbb1c47c36f1a68c8975e5bee8a8249c38ea589569eb75e3e7723a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578565bb385b09d8d624963e2bfb2aca1
SHA1fd5715f8613e5fe6d057d1d4c727348e1120b55d
SHA2562acdfbc2d0a57b8df04f5cdd60a9952700050253c40260b394233a966a53da3a
SHA512fb80489866c51019cc24d970ad52ea25af96e6b2f6441508cf672ce52840c7d8e3a53230a3891f18293ed60c757312125b55da9a5a01696a1a35fec67d4bb086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b95196b21e39e43a7c70bf1acef94023
SHA1c8610cc71308ca0e99219995676fade8daca9144
SHA256debc680215ef2343028f172588616ef1d82c575fb8da58edb5a9cdc22dd326cd
SHA51215ad07e381763e2c4e7cf0ccf1dbe5aaa3bed6cdb529c0d661d6e9f5379cfd6d7443dc647c81dd4f14393a9e9e7b2eed23bc8c4df295579ad5b4153da21309e6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b