Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 03:13
Static task
static1
Behavioral task
behavioral1
Sample
29ce45e97190593b2867db6050abc9b2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
29ce45e97190593b2867db6050abc9b2_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
29ce45e97190593b2867db6050abc9b2_JaffaCakes118.html
-
Size
214KB
-
MD5
29ce45e97190593b2867db6050abc9b2
-
SHA1
4bc4d4be09805aa9383b0258f2be3b4f96cb21b6
-
SHA256
0658f22c051db13834ac8963ad34440c00747a941ce5f04da9c6eed39e8f715b
-
SHA512
f13e2c86f34dab2ea4d1ed19957d3302d843fee488835c68729e5c3f0839788e6fa5b82badd24c1f9b5aa3077dc29ecc2333a35fe5919314cb362740be1b87cc
-
SSDEEP
3072:drhB9CyHxX7Be7iAvtLPbAwuBNKifXTJ5:hz9VxLY7iAVLTBQJl5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000c7bd116bad26769c4525cfd4152f254b54eb82ab2f673d8e6461c1921d5b0c1f000000000e80000000020000200000005cd6c8325d15e0806d55fcb9e1394a9d38b9a5019faea467c04a42b8652fc60a20000000afe85012934832a6434d716f36fc27829412d7ae8178408d15b3cff186182fb74000000010a70628063e7afc1dc7134eac762e3ad5cda2e48a90bc89f9690ee3f5f174ddc59fe1c09ce9fd173108ae699be1fe09b77635071d709961961576316f82b2b8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AEA7A861-8633-11EF-AE16-46BBF83CD43C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000def7752f11444e422cccc87802af50fa995e65d6115f15c6c12849a8e120b435000000000e800000000200002000000015439a0169b27a4a732d1766a08a099f2a9088b7745660358b9eb1746da7f51890000000da3f32f723529331097f781bd9a39d01701a04374d157e975bd424f8608d89ff91f069e736062d4ef1d68db74a681ebd2210c89d6304d9ab9ae9d7edf826ddc48c2789dc16defeb3e5826758fe5821c43a0a4832f0a83f4f84a88074450c113fb25e4e3f999dff7944df1d259516dd03721208d5c2690aca4e8e43c731c175247e2f34ac7a23ccb23d446a24fab8efc940000000fbdefa7e3c275d307619940b8ca3428abec6b7fe60f340e623a80152504067976df8e74cbec84bc1305d5b428bcb2efd09ea61b3828018eaac10742ba7e96122 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434636069" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20f78ec2401adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2708 iexplore.exe 2708 iexplore.exe 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2848 2708 iexplore.exe 30 PID 2708 wrote to memory of 2848 2708 iexplore.exe 30 PID 2708 wrote to memory of 2848 2708 iexplore.exe 30 PID 2708 wrote to memory of 2848 2708 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\29ce45e97190593b2867db6050abc9b2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b0cadff1f43fbc0f612ad1889df6c58
SHA14966f649b4ad3e275716d3a560f1a7e0dd92c55f
SHA256108335b5372e062ee5cdaf554574048d1c21ba821987bc9010bc978604e2deec
SHA5125535aad64236123dd587995b5666cd9bdc758bdff2e6d73cad5a3703de4cb46ad31d1ffe65327bd7981ad39a185666e00c1a492a4f4a04636a0ce79cb9bb3fa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a870356a2ee24fd4f19c7dd3136d1ea1
SHA13f22e66cf15245ce5a4b27ccda059ac081fc134d
SHA2561882cb6047b7b1885a3fce81ba54aeae68647ac9e1f941d8e417d53e601545dd
SHA512a6717d9e88a7a45a02e42b40307d166eff7db51c3165a4bbfc510d16c27fbf61a013819db95621c6fe5da1ec23c83a08be64409525709129d44859e2a88ad7e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d4860b203b7d73f0d0bd84d9ff45a23
SHA125b0cc6388ed49095675b415aedfc6b7c8204dd6
SHA2564580a4cf2b188ecba55fcab59df8d29beb3bd82c04907225f6f22f895f2f98c0
SHA5127ed76be8b5e56c0396aea88efa2ad901352b577542b96f624df20c459de972d1cb1dcc3a2c9ebf546a5ecba34fedb423029716c4ff9b20968ff378651fc30ff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eace24bd72848b4bba044ddd9f4c99ba
SHA14d083289506dbaefac979a6046f705da682b5b07
SHA2565b5ef0f819e2f373de146fa73b7de8d2aaa2af9324c75b629cb8df8309d44663
SHA51270855187b109c2829557b356a7cd74c8e152c0fa424865f307baaba0c94900a87394d14c846bb14693a25b6f3c1239574bcaa1fd32e34f5f94c3d7eebc5c1aa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa11469354fc462ac088e7a57a16897b
SHA128ada4eeccc61f2d1a4ad9407887312933f32c5f
SHA256b6ce411913ce85294c2d435c7d41da1964f8068478cb44995f766c2a57f953c0
SHA512eda79fd7c3bd2529895810a3be834773fbb374fc5ebd2e35eb0ae4b5e2aad809199ca04e35a90496f619d783e2b628d82b7a24e83faf7dbf5497df0178e2de3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597f7f0f036f01bcc641b3992d44f6640
SHA1b4d0f4a0c0fda4cd3ba6f83098bf2a36419de1bf
SHA256bb97415fffbaea5da87beb76ffbe564d93ad4e49a41f6b60f10a6f8842bd9ac0
SHA512bb8bd1c8f4f318164ef2c26cae6d6a2756a7cd2edea37ecce3a152b89bfc7b64c487ec31a9424cd162ad9c053a5b96b48c156d3dd80e6ee69c9bf70e8031422b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52892d2171421b7583a071833ede0922b
SHA1689960d4a2f84393225835b55db556ddda3a7fd5
SHA256abb9fc2a1ae2ab3ac12e9179dbdef67a7f890c027de28200298c0f27ae25fafa
SHA51251b84d07e8950c464364f8b8e017d9200d730c3e24fcc6f5f28922859c230cce593ea890f61b5fc44320ff1d3082f0dbee53d534bdcbac43de63f46f3b1b8937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532b7bd2c3db00e9102d86d584512f7b1
SHA1474a93e4a0dd13754bd8356089f4e2c1e5c8c3a1
SHA256c552e6f257d3ede12c9d5cbbc7eab9c9720fdd84604da2d3184dc616f235aaa7
SHA512aa7c51dca67ae3063dd7b7dedd38cae38be009ceb1150ae03468082bbab8dc04dfabcc32fe96bb926533108074bc21ae7a89ac4de1344406dd631740c39165d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d35c39d5d412a9ec1774313d641d62b
SHA17758af91daad751627d0a6d7c6224927537b3f8a
SHA2568c0f166d86a859b6a81a5613ada78f412653d6349a722fd6d278cfefc53c748a
SHA51269fcb89fd9e788475b0c85aa1d402250724285fcb6a57b18ee9d1aeaceec445f14abec9c65f80ff8745d893f82a060ec65f784217d67bccb179c400456013bdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5719b69efa6a2de46937278e315709d08
SHA16ea7ece4686dfbf830fde2c85494ec1d60691f57
SHA2564b036d64ae2116f68e1564e4fc0beaa66e6db525ee09acab8dff6675d89de349
SHA512cd66195e0d997705bfaac82bcfd5f43878eade7bd122057d7cc3fe5183240dd994387bcae4ed72e0bf0cda181dc784adffac524b3170baf041aa2f3dedc10483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fae86fccfcb6991eef0e1fe3bb037134
SHA110b0e978b94c1c71439966a98cb41d3c40f4af4c
SHA25655ba66df8c2f7812f1a6ce4f102144d90deead57583d7194f24b7c92e96199e8
SHA5125483b95e4223cd8c168093cfe0ff0625e9b371a387ef51a98ac09f40f3812dda2cffbfbf0810b402b4518eeef40fd50c69e61f5ee7ec544ea1cbd250804744f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaedb8cf0a608c5c1df43480b6f6c692
SHA16fc93c4c3395e45de7aaf72770fd35f8729f258a
SHA25611153a96929ecf8f28bd7069123b18e35e8c7ce04a3e3c436f6e9a1b27c4e87e
SHA512f9498034a2e3f24db8edc4203fae5ca83eb6b06e363c82c89373266d4e665b04f2bb0bb3944f2990c795a1bd3e0b731b5103fba3ad685b6356d235da10828c49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aae33e05839490b4f25272977ea9a1c
SHA17f3ea5ddc7bb601ac9a1d9b78785ee882e50229b
SHA2567b2a535a96f2e64fd97024cbb0252fed93ea0b91616d4917e18dc6dc3e2e6e19
SHA512447d71a8efc228d6fe4633289d29ec50711800df3b75e2194c1344916a9b7b84e469a1fca68b416ffef0fa425129cf7d2d332d67a898ed675f142a27fc1bbb97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4c1234049cb3a9453ef4d74090037a7
SHA1e67ad37da921e888a18ff16d04f361ba12b47a1b
SHA25655c6dbc354edb88e7ccdb19a546be1bba95b273457ed5e9fb0b6f6c25ef6cbfc
SHA512a94a225439f6c9f9662b7f6b839dfdea568ab0a6448197431d32718d1bd3fc45dc74033979165bb542cec03b8f69e3702ce14c836d7cd241eb212806b7d16793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ee08e4ccee18206858fa9db10cc977f
SHA170903e4252c4dda9bc1121beb2bdfd578d2d9f2e
SHA25613b4ba3cb9237438ab62dc91fa6b92dff076e03a1890337140923679de1e63cc
SHA51258b7cb082234f58fefe7e7184a2c2a572e27d026814d8751378d061c1b58e068ca2d0b402289e4f24bc37cebb159fccbe5ccbe67da2bf50282539b9439c115ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5140f9a133a844dc732ac441741d4203a
SHA13abae21ce07ae34dfd3f7791f112c884703b2392
SHA2560918a5a62c3125aa4f03c9fbc55b53ce9bb34325e66f4834eaf046583a10c809
SHA51206d606f23307e7a3fcb8f6cd51c980d449683952bfcd08b1254cf7c1b33ba22b58b44460ba4f24ea2d9129c88e4b1c61199ed273f953826b3c16f4fe27dc17f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e5fd55a881d33e128a6eda6b15ba849
SHA1b7f3e701bd81784884d095fdb687a0f0181d3a27
SHA256366e2531f2a743ef130d68ef3c56927e3a06118e7efde74e588346d498f933e1
SHA51231a030db608caceb5b2c9a12ec7a3e6e6b1592be7e63e6e1b779fbc17c4a562fc6f17da536c9619791c720169199f0b515829a4f3ce0adb7eb422a564d74437c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560dda10f4eecffa4d329c03180129c8a
SHA1ce6ced7d1897defe3f6f2de99881a04b590b8cf0
SHA256b9e40bdae3b59929176b882fc47e734de987f51532193f432de2bc89a9875c7d
SHA512675228b91327f1ea3d53d20cbbb60202c224657f3ea0600241ba5c3f9fcfff24a4cdf088f9f2df5c5a7ac6b5cefca98ad7b393451846bee1abdb9b6c4d02f134
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b