Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 03:41
Static task
static1
Behavioral task
behavioral1
Sample
ffe35f6a1346b75b21ad258581fdac35_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffe35f6a1346b75b21ad258581fdac35_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ffe35f6a1346b75b21ad258581fdac35_JaffaCakes118.html
-
Size
23KB
-
MD5
ffe35f6a1346b75b21ad258581fdac35
-
SHA1
33752587f354ad6161789dcaf8feef993134d4ee
-
SHA256
44a18a3b3d019bd51fccee1e2d80fd9a5e0801a42f12087f8cb1236c3f1f1f11
-
SHA512
00a6242a019809eb686067184361b138498886a16f954c955dcc87701be0cd278f5cf578dc4d2bb0436df84c8f8e5bd054fc1f9812dd03513458e293ce0224ed
-
SSDEEP
192:uw31b5nQenQjxn5Q/XnQieONnenQOkEntFlnQTbnhnQKdjMvMBuqnYnQ7tnqYmDQ:oQ/RPwfc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EC870AC1-7EDD-11EF-BBD1-D686196AC2C0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000058abf684c8c8839e8c5d5df0292cac63079fcb74c263421cf8923fa9bca33600000000000e8000000002000020000000c1cb45dfe9ee3e19205b936e6899e7b0c332902b9a3a76c5aace90b53e43eee720000000071b82ede504d1661ec65ba7ec7f16d0dfb8c37161392dc9844e61c6bb9ec4b240000000f8b26a179e516e1ca94ee9ff8becca6924d53be125871ee45d0938a899ab269f5fbd92616cefceb3767bdf837a243fd379a9fec8bff5a49a26973240c5f17dea iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f090b9c2ea12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000ec6fd0bc09e9644eb6823ddca38a3fecd01e0300415e170c85de6466968269aa000000000e800000000200002000000029337fab47eb36324461ec3878def63be03dc35d4dd65668ebd70ce628a0c8cf900000000a503ab9f4ebfa909e051b39e960355d2ce8b35ccddc055dafde63794f721347ca06f2fb2ce322e1c907c754c3933a837c3f9e113dde213362bfdc3dd099b26bfe8c005731502bcd5d7bb2cb8122036d8814af456c0122715b59e6cb48dcb30d34d004aa1eff6a72ccbcc6d6ccbc775b237067e2fc4e023cea6d0bf5495bdbb8bb39bbf2e05df0b324911a898974322340000000963d18dd54c7c0f637f640be0ec664df24bdc02bdac68400913d8efcfbe84de9d48f4d46b96d3e34b0b515a44c556085ea31b2009ee9b95d65fea38dfe437af8 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433829577" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2392 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2392 iexplore.exe 2392 iexplore.exe 1636 IEXPLORE.EXE 1636 IEXPLORE.EXE 1636 IEXPLORE.EXE 1636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 1636 2392 iexplore.exe 31 PID 2392 wrote to memory of 1636 2392 iexplore.exe 31 PID 2392 wrote to memory of 1636 2392 iexplore.exe 31 PID 2392 wrote to memory of 1636 2392 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ffe35f6a1346b75b21ad258581fdac35_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fa15a9608f5a68b8bb46b83dfbc3b2b
SHA13773a9780d274c68835b1ad36bbc4d5b2b71b4a7
SHA256ab5e6dcab29de36ed2111b7d65f9b0ddef553a2cf830ccb02e21bd12764185fa
SHA512c698822397c0b6cd02c870820b6edf1c554f0905f01a2fdcc62c0ac6709a1fbf2f543f7d91cf8be437b44076cb2f5cd0d0ee8d95712a926fc2853b632adedd1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ae10de776ee4928fef2f3c2b03e14a5
SHA12a3deb33e93b4b864803256d4af1cc2002732df0
SHA256a998573c2bb0edd70fee91f45e61c1634af00e42cf63b11a83f9dee20b4e730d
SHA512898984ab51979244261c9d7fba3e361a6e1fe946d1161a5c16525466c29ca77c04875fc14e56e952e7df821943e5ed70aa5663a6493a33bca125f0274dc2ff46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d6d5a7d8389ed12ce1bbf06b9c53b21
SHA1c510a6986daec0b8c3db3c5764b2574256ccfb47
SHA256bb4da888888251cdc82af059ce6499c3c85788e44b244122894645afb3b28851
SHA5121222ce75ab4a677d17fbafd363346e1b5cdefe8550b50e60dfc4501b59a47aec023578c7fe4db1066097d5faaea494a5ac80b68624ceb5e91d9accb7d04e8701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504e0ffb58d9cbaa11e53d4dd30098e29
SHA139470a4a24c26734cba1f6cbc96193e636b7ccce
SHA25607937821ded4ad6f1e17a57010df68a7231bff111a7fa08b5b25b352d1319f2a
SHA5127ec1759900e746c592191fc283baf5cd67cc459ee2682587d904602bf9107129dcc4f02674deed42d30785e80442674efd42491cefae6cb6395c6e3d00f7c088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55850bc111637ecd7c30c523a6b7fefe2
SHA1c038807939cd26475bcbd7a93a4cc9f66f1f3039
SHA2565a7937176d01931ff46fb8a97e7e619fd02e54175fa3f1cf35543c4c604ca537
SHA512b76a544ded5c8cf133da1858d90f5bbe83162cb460332c9371318d67552180d4405fe2338055e2909d2c64c4796d39209eb322a5d50a9330547ed382e8367615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543e8c486f14c584c0e84e1f720ff5a4d
SHA10606a9d289277bcd839852ba1411c6ee3940d026
SHA2564ce6af0270bc4ba6e3a65c061cd6f63b8f6300352efa5442cddbd19cecd986d9
SHA5123ad02d7339d3c8d9659b0f6c646f717d1a74a5bd679344724e55427d77b5019fc24b1a017de374cc5ff83b906f12c6eb4556047f87cd6dd4f38f9ca4867a1b48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de7fe0a7ca331994442b3b97528a16b5
SHA110128b3647c7102b6b4403c7bfbcd55ffae8dc46
SHA256358a18256690b508b812d6a9cf727ee7e2630960f0a301ce3e49b0f10da05935
SHA51220bdeaf4320baa34c8ff7b9faa2269036e66160ccc31d35da3c5f43c4673a9be40aadf37b67e89e85642c3a0391dbd05071b4757b47c2ac7648c19d6ad07b428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525e384eae4a67ee58d2544aff5e48010
SHA157dc64d7fe018ef48ea14b62857bac14afa02aec
SHA256797c691296ffa20302435cf1951a1fd57062e14286e449aa319e1b217bc6333c
SHA512f3015c7ad38cfef3d2723eff374cf4b84de971657d6974f2c439cb7d61f74e23f21526996d0dbf54ef981b7e54c1e30af8353e39ca528c9803e51799f3086c7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511d1c177bc875c344cba5d7cad765c04
SHA1b85b754d53309d60d1d5533d68179747e30b1d6f
SHA2561b4a81c23d67f6396288decd37a42d1b24a9bbc0df86be89dad9d56aa5c48a38
SHA51290befe78d512b65db5e5cd0bb770e724456374cce88c4c8f8f853c2c45727c34849b5f36c47ed48881d378ee90895c7685f212d7ec0e6c580a900050a9be72cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558244553d4ae9c644634d2162d04490d
SHA14ef1c9fde24da6bbb9322dd99f84c7efa1faa275
SHA2562a11b535fffda89eee456f142b96096eab4d75178ded9fc993680614786eafda
SHA512e5bcc5e2e65ffb910b538b52f6ab628f19a6187485d522920d3a7781b95b18f7efffb86b29188e7a214db73cc3f72a716deb55de1990729eb2ffb4d6944cc34f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a29d5d638d5e27507820d2128a423d3
SHA10fd1a49129e8341aa84b9b60d5a5886bbfbe0fc0
SHA256a4508adac0cdf1f9e838b9178bc37670c5c92ca8a1b74c3186f684dbbed54822
SHA512ac7af4ef552b9bed98f384a0ea83e5eb62efeadafbd3031ad30b4cab943ceff4ee5e51d386f05947fb30a9fe1a36af66befb50612dd11982edf5f6a9ece3eadd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea0499674d43c9074f1631073a81e500
SHA178d8c4a926ab52a95d44468dc8dad9a33b08f71f
SHA256832fd8cbb39fa481625bb6075da3e6f047866847906471d5106ad29527fa8036
SHA512dc484dac8ceb153500f22acb68b1257c257241d8b0f4f08cfb878219c07ff16ce3fc8780aeea5c055e09141f9f58035199f463c3977ff842a4e2af0067de1ae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5556f448472529c0ae239a513400c02bc
SHA168f0e05c5629219b9134e7aaaa0c8cc11db71975
SHA25616feaa060b7122ebcf60492b5e7bfb672eaccf7c62fcb3571c15bb89d880443e
SHA5120a5b6b4e20c046d4bc37774be85eace83cef44f6b66c3c86a3430a38fcb3f9aa43c0fe2a5221c5eab91945f1c0b5adf27735cd614cf97e10a5ab3e3de111ddaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b58b79e3016dc0aedf5773bece10b23e
SHA1ec688ab6f985bae596fb0b05f18118af460f3987
SHA25693e5ef2ef0c91ced7900ff6fc4aa2273be1faf5c1eb82fb5789246bbb120df0f
SHA512b8bb06465bdf6b2994c868b378c676833c36e02c9cbe01cf59ea48568595c66e66d8eb0ac057d0e659ff07774d7d17fdb1f5d9041cab627c4a6ffb2680d42cb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f10b33662208b93a420a6d44d85dae4
SHA1cb13e7346797f26086fa9475f8821e2c5ed23c37
SHA256f85636d7e0254455f274ae594cbb30f29f5b00fb98ffc66d6928e05ecddb6c79
SHA512b5d33f822683cdf99561336f12916c1c92bde75b98e4c8c610a8ad986a30d3d17fa60e75c163967c7a5016d5a0e6def39cd2cd91f4618d9fde6b9046d2f8d259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fefb84a2e04550ff5108b8c9c3baa12d
SHA16c8957dfd935be8052a076babd68d313ac619086
SHA25690d3d9e2c65c2fcc86e381a7d1fcec1cc0f5b363a26c9f3c32e0ab44e15029e9
SHA5129f16060d4ff69725241c9b3c8744b7ccdfcee347f2f595cc4fa255774ecde7c15f6f7d99117a900ad8484ab778fc52913e3edcd980f3647cb60aa975684aa938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5726f7f848954a8fabda55441cd232143
SHA1a6b355fee81fb2b4adc700eb8062d395eb495fff
SHA256c7fd9614360be6453fc613f7a0c86f4a5f10f93d75fe1a003b6000d98f250876
SHA51209db8d46677f8e0097a29875d20200007864a98788c194cd693cbdc81ae0b2b6c460484f2bfc51a8176cab1a50bd9991ca4f3da047cb41f59bbf17deb314b890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3e3931746f7ee77d1cf7091906e3132
SHA1ee12e8a4950880cf20fc3133a18984d2b88442bf
SHA256b7054b1497ad2a5ab9385d645bb83a08c42852d8d041855bd63d7451d724f6bf
SHA512846faed84f9c429134a2c308839d9101962ee8ec7fed2aa2a50f74eaa104948f9f2390be14833c5c48ec4710c3512ac327df439d4c67d131953ec5326ed95c20
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b