Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 14:14
Static task
static1
Behavioral task
behavioral1
Sample
feb335f68e19db4523503152e6ac0c1d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
feb335f68e19db4523503152e6ac0c1d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
feb335f68e19db4523503152e6ac0c1d_JaffaCakes118.exe
-
Size
9KB
-
MD5
feb335f68e19db4523503152e6ac0c1d
-
SHA1
97feecd614b741f1bca6cd07338300660a07db47
-
SHA256
967d5f65a1eac15ca0acd64130223128947387e6ea79b709588a1524d27594b8
-
SHA512
1776064868bed47de29ca0ca37e4df29555f06547676e4fe7d172b14eaa36a70180658a14f9ea4c773be2cf2d2e1f1c85d4b7c8a6700ba3b7e91aad0d6b13cab
-
SSDEEP
192:FQ0EoUpgTNqG7qul0/WhySt0yaArY5FoqhwqYBX8s:FQ0EoUpgTNqG9hGHArsFthwqu8s
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language feb335f68e19db4523503152e6ac0c1d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433781177" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70a51e127a12db01 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000ad26bfbf7170c7d2535f824770880844187ccd37b2b6f851565efdbdb2705613000000000e80000000020000200000006473c135f8541bd03654663df99867ed6e908631d48309205a06e0f4f0d887e120000000f026dc79a4484f71412e653bac6dd3ac7776d4e4deed638136db8981c2fd4d3340000000f5f674f9f7fcadf53f489f60095008b6b21f860c268d3e11f9fb9cf25ae4ecc40f80b405debd242a2ecd79ee4cd300112fd809d274f5012aeacef510610a2e7f IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A236561-7E6D-11EF-A839-E6BAD4272658} = "0" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 IEXPLORE.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3060 feb335f68e19db4523503152e6ac0c1d_JaffaCakes118.exe 2324 IEXPLORE.exe 2324 IEXPLORE.exe 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2324 3060 feb335f68e19db4523503152e6ac0c1d_JaffaCakes118.exe 30 PID 3060 wrote to memory of 2324 3060 feb335f68e19db4523503152e6ac0c1d_JaffaCakes118.exe 30 PID 3060 wrote to memory of 2324 3060 feb335f68e19db4523503152e6ac0c1d_JaffaCakes118.exe 30 PID 3060 wrote to memory of 2324 3060 feb335f68e19db4523503152e6ac0c1d_JaffaCakes118.exe 30 PID 2324 wrote to memory of 2036 2324 IEXPLORE.exe 31 PID 2324 wrote to memory of 2036 2324 IEXPLORE.exe 31 PID 2324 wrote to memory of 2036 2324 IEXPLORE.exe 31 PID 2324 wrote to memory of 2036 2324 IEXPLORE.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\feb335f68e19db4523503152e6ac0c1d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\feb335f68e19db4523503152e6ac0c1d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Program Files\Internet Explorer\IEXPLORE.exe"C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2036
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54326e0b2b1c45eefd88b1573ea8b7db1
SHA1c2c19a174fb5696437a4d602ff341a4be50fbbbc
SHA2567113a7a5e0d862c078a0eef10837d6e4a13f55370255413df2fb0ae7d03b1cc6
SHA512b3716c82ba7aa9d36179d1a3bd74ef6f0e3ebdcade537e26b8f93c76d801a6facf75596d2c1d1373a6ba2e0a604d26907973104509a79b22155ee33e65244306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5257efaec65e9612a6976f7860233e3b1
SHA1a689c1dba5a0710fc7afdcf66ac062432c9ec506
SHA2562a7121d8f94e2fed0500f5916528eeaf1611f4e147dde458a6a83b150382ca8f
SHA512856bc91f2f235b830130509958d5cd05d84e4fd3663d8a68951198d481c08bef0dedc6cefae79b96ca8053c4b48e419ed76749d28c10a9386e6300769a1274d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7cda20c6afacafcea7141cb0bbd0ec4
SHA19df4b84780b497524953e593532ac6271b2e2325
SHA256e25b2fda88dcdf226085011dc3d3658cde4c70a72e0776b334d1fee61780ea91
SHA512f21015596e752251ba43e19af5c3d60d3bba8d44d58114543b74bb23a0f99372e6f777560938d8b6d1d88bf58ca1c2c1f7914df9259028e99fb63fd1d2f1dc9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dc6344db6db877accb9636d5250ccde
SHA11b97804b61f7db1a46f3889cc3283489321087d2
SHA256102eb88e7fd634bd610ba3df72ce4f8d551a220c8561cf4d19cddf6d4a2fb5a6
SHA512fd13500e7740949c2efc969fe33ffb5b5a37e5bf4f3ae5e6d6a23b6330b0fc73dba563d551423085c80f39a2f7d2069baad912d99dc41cc8efc59b78417b6e9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f408185e581f24bed288c3e524004e70
SHA1af7c9ca1f358a106a179ec0167f25f124b23e998
SHA256edb45fed264fb64808ca0b0ebcac12cc89fd6a5fe6380c4b952a9c18d8676228
SHA5124313333dc0f4a0d57501e7a014aa71909569dbfc0a5a4edc61e788ce9c5dc55d0d8de135868da7bcc9c5274ee468042550d2a8e79a2447a4aa16af5cd68ed2ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d36ca83015cde854fa4cfb60ea1259b5
SHA176a4a08079ffc3fefb67b6ad89c882d5ebe4f7df
SHA256d2b7f0463138256ea4839e00b6f4d820de4f77f66d245202cf4e0810ec84ccea
SHA512ee17aefa8f688f8eef8bd69257207b85cc3bb50b93bd24b29647c3c909ef8897f067b1ef85b845525a7e318494fa5a75733df9701801ee339be911973479fccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4f8ffa8f8855d1961049ce4de31fcb9
SHA12159e3c6abfb9a99874483f135f893e74f17dac4
SHA256b17c11be4ba56762557f3317e6b745609652c2904571ff1bccd76956450c2e27
SHA5122e4b8722ad4ac9e3e352662e3ac3058f6d71fea67a9b9ccfd07b3866f6fd7a464d4519dd6064741f4926230ebe3181ac96717bbbe3d60252d5e97cd1dd35c43c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbcc4bde61f5ca1f17bf270a51f61ab8
SHA17831833d926a464f9185d610f0652d58a7481487
SHA25605ba0b001c1303b97b7241659c6e857fa64f719b6c97a7fbe445ed5e15d7dc82
SHA51231039e83d9b5cfa1e5fb12c96159d165b41c4a21aa9bc68b102e91f719303985e800c47e4a1ce14b757e972e29db643ed2b93d841af83461e4eb7069ca6ecb03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b7a229c9c55e7759cabd7d62cd1bee3
SHA149a9efd724a1368b494a6651f31c654118c09f96
SHA256de5ec642eac78b41fa197be6c2ac5ad6f9bee7d891969c28480c445be8a8d958
SHA5123fbd68d08862a930c4ccf55caf993603de4ae2a45316df9b3d7a62fc7acf464102947196143b19e25f970b9d3e637bf50d8678c08c9b0a41a9fdc09122543edd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595ca0d95b0a396a755506957d9bac7fa
SHA11211510d7e60103a5e59fd7d44fd173f38d5bb3f
SHA256ca3643ad9769519a732dd300c6ae7c1d257dd254ce4aa009975b56174b2b6274
SHA512218a33dc0bf0df966904d5cdfb6308eaf2f7855aabe9a40114fb884e077bff0a78bbdce088f4656306f70e173ab56e9d6e571aa010d5e4b4c6b98cb1934782da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5022e98349f8c2173bd0d03f6412c295c
SHA1e18a03b77cf3d06ede9dac3cea0d546d080ad2a3
SHA25632f6b34bc8b2af5179458912475d70380dc73d8052423097fa14289af9bf03ee
SHA5129942f033d741131bd1d083461576d3e23c5f966df5cc58724b11836f0f143f22bd7a4769544518a7171973424320c0e7a0c3fa164958450d444c4f44516f4bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aad1f02b10962676180198f9e605de6e
SHA146e928f94dfb9146273d7eff96659c258a1c7d13
SHA256e27286f0cf6965a093168b2dc1399897ab5a0009ad0193ea051f7310b7e8393a
SHA51236cc6e73e9c515be06c8a9899413240b2b887e9a4c88a6f10c37a6e3e0dc1f1aac0949532791dc31a4556f92b87aff8b30ba51011e72adf1f7809cc82451b2fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598e4eca1544e193f9ac8d3045e76227a
SHA16e4e57a90ee04523f12a18c34bbaeec669648e92
SHA2566a3d455e40b853ae3060459315e31b480c0a3ea68e3f648d34a73ceebd948095
SHA5129c4134e588ee6094d76b7d1fa39df3cdb13d1ed73fe931f24bb1fd3244403b2529bf0bd561b3c03967e7b4a0575d748788eb9948e926cb73d919c4b07bcb07d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50406489f51660e8715d17fabc00322b2
SHA19fbe9e100b26b89bf36c1bcaa8e40c6a48f152e2
SHA256c1fa6fdf67dae056b808cdff5708a3ddcf0295b6e5d3702b032e8e53b48c44e7
SHA5129829b89bde0810be897f5fff46e4f0f435ca3a31c7074536d5f94f5ae24261d00bbc5e8105daf0c96be8fec29659c3e20681a32bc24253b3622715c0b45cd9a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdbdbe61932732c3a2c3cb4c56d0981b
SHA192b6c75b3d3d0a14603123e103b9298440ec2f54
SHA256b6267a55c49e75542e3c1838c50a854da4550a975f4b0b6428fb5d75d487d4cf
SHA512300b79b0468186cca11723407e1d8e8d3aeb48c4d9237289cda51ce474079dfa37e8bd000d38f53521a70816028878a1a62181d32e6442a1933d6da2af543b1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588b2258e48122430e2f78c68b7bf9981
SHA1c0e82c715faa6a501a920e42d0c6d29c8e1537d8
SHA2565a7169aec2113225f29e39585d0bdb3aab6f793dd35632db5f6ae693ca1103ae
SHA512068951f4f90e43078969ff6cbe0341489ddc36c57de989e911c91e61fc31a518bd684a66bc3080b3c61f5da1710c9c0eda9d459df941dc0ff867aece4dc1ddb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5380207ab077e3bcc06a86fc25e1a1e08
SHA116f8e3608e457435fe23a4282ecbbdc34572a69d
SHA256600935b9ffa6b9d37d8d121984891d3ed4291a85c91b5cd0709b6efeab4574f1
SHA512b84543873cde1aa4c18b68e7276115345fc23cf08b8a1d122155e679b7c53b99f9a44e838b3f1e0f21199b2e401dd30abb1d063dc4bacb37d46b87b4575c5a5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dabfb52c410b5a973636e7364e989cf1
SHA117bdacdbe857b365ef66c6a3d7a23f23bb94b75a
SHA256dca2e013bc12dd1bd6838c358ea9754bbf6c98e303a75a43445fc34c52e107ae
SHA512e77f340247190baa00209d1f152c06a3fdc01a616d917ffbe268e38f5ecd4f3bc69ec9ba7d155662cc600de9053cebdc410570492c6807c4cae8d7b58defe9ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515a6fb1c3785ce25083b66144c1341f7
SHA1cf448d58e6340175a092e8cf623c1284342ba83f
SHA2568ad07fb9a8dd3a293a360629391c1a2f2de889ae059fc709c490e7bae92d0d84
SHA5121a5a3acfdcca77ecdc2272cf38e8b21066bf0ef9cc7cd81e859ed82a510cc4d15ce0dfc911cd0b066dce4c8c4f6e391471c2be95aba48129d655e67ac17b8061
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b