Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 23:03
Static task
static1
Behavioral task
behavioral1
Sample
54281b69f91fd98377002df544b5ff3a_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
54281b69f91fd98377002df544b5ff3a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
54281b69f91fd98377002df544b5ff3a_JaffaCakes118.html
-
Size
8KB
-
MD5
54281b69f91fd98377002df544b5ff3a
-
SHA1
560784f6f12bee14796c3a57b4f6cd34e9b9ef69
-
SHA256
b40560f73cfe28c840e2e7e3f706a21c4a41d878fdcfe9c8c322e537b2b1af3d
-
SHA512
ec4d9a03f2ccf60246cd4d9f84f18a2ab76a5d0b47bc14ce78d04a7a80a6fbe6278d3ff981b113ee019b12c0202a1c762925e8f7c8639e12ad01f80cd65394b4
-
SSDEEP
96:ByzVs+ux7bpLLY1k9o84d12ef7CSTU7BkIIwvzR4CIp7ncbZ7ru7f:Ksz7bpAYS/vvOJgnq76f
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: IEXPLORE.EXE File opened (read-only) \??\J: IEXPLORE.EXE File opened (read-only) \??\K: IEXPLORE.EXE File opened (read-only) \??\V: IEXPLORE.EXE File opened (read-only) \??\W: IEXPLORE.EXE File opened (read-only) \??\A: IEXPLORE.EXE File opened (read-only) \??\M: IEXPLORE.EXE File opened (read-only) \??\P: IEXPLORE.EXE File opened (read-only) \??\S: IEXPLORE.EXE File opened (read-only) \??\U: IEXPLORE.EXE File opened (read-only) \??\Y: IEXPLORE.EXE File opened (read-only) \??\Z: IEXPLORE.EXE File opened (read-only) \??\L: IEXPLORE.EXE File opened (read-only) \??\R: IEXPLORE.EXE File opened (read-only) \??\B: IEXPLORE.EXE File opened (read-only) \??\G: IEXPLORE.EXE File opened (read-only) \??\H: IEXPLORE.EXE File opened (read-only) \??\N: IEXPLORE.EXE File opened (read-only) \??\O: IEXPLORE.EXE File opened (read-only) \??\Q: IEXPLORE.EXE File opened (read-only) \??\T: IEXPLORE.EXE File opened (read-only) \??\X: IEXPLORE.EXE File opened (read-only) \??\E: IEXPLORE.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435368086" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50a958e0e820db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b1319000000000200000000001066000000010000200000001f8c46319833ef5223319ec2ae1c74645523cc4d2dcda60f18f726802d8b45ec000000000e8000000002000020000000567f848ade925a9066d5a004a3e530c98ec824a958839291d1feae35fd8672a29000000096b60133e9fb708995389e67ca01da8eecc013f9e11ba237e2fdd270190a6a0dae80add2aecff6c52b4dbb2a3210abf10d45fdce9b1e18751c1b17e92af1fb3819fbd22ad64f030b78981d38925a25ccb277f3e7ebf80a321437527fd4e1764d1685a20733790c3c8358bc65df543ab8991ca9cee97ab055bfd016e08977a96fe68b374c7995deb0ac9acdf96f22c25f40000000a44675604259f2eb5c314e61be02544e44974d25391c105e589f00211ad62a8bc8663f587855d4a56e0f7ccc8fdbb0ea2a82374c232652b170398de594a399f8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0A3B02E1-8CDC-11EF-A276-7E6174361434} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000514901a2341f8b8d4275cfc88e40120c3054b53dfa9ef9d337ccdbf522007712000000000e80000000020000200000002f13d0f9bec6b3d2c8ee6e0cb429ab52a795cf2eec6dab17f8a82fc578bf26172000000093d0bd83e92e3961826d0a7e2cfddea2bc7715deb3b230336e3c4d1b397fc4b3400000008cfa0e628a708ec07237c565dba2deb248077f2a2b9dd585671ea997e1ab1d3865a19fee259af9b337de6179bcda1196535ef6f1e9051504296a4ef26f812b86 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2912 3012 iexplore.exe 30 PID 3012 wrote to memory of 2912 3012 iexplore.exe 30 PID 3012 wrote to memory of 2912 3012 iexplore.exe 30 PID 3012 wrote to memory of 2912 3012 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\54281b69f91fd98377002df544b5ff3a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5765e1c9844beb53bcc5257096d519a90
SHA112c899b967cc47e27768290c936d2b3800ac7fb7
SHA2568d81df840e84b49a27a4d5f71a2dcd0f377314960269356f77cf016ce45a1551
SHA5127f254202cfb630a861f01a4a1fe09a6c4faeda48f66019ccc0cb2263fd744284a85207798ea4d5a4ccddfcfa067bddf16e2d541f1787fb2e0a5db0a5f16bf0f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547d661184c45678c7d1fd95674fc618d
SHA1cf7df608fbd49ca652432e7e9fb90b3cc009f822
SHA256dd49c3f5d91b56e09b9de9dc8eb57ef4919f8322bffc2e9eeb46a682a941f8d7
SHA512259f63aab3c08724e94d3c40047f724d4fc0e50646e9386df653bb06f17d2dc1d8ad4bbb9e041f0e19d4f77ae05779859780ab1fb3014eb810f90b6793042eef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f963ffd1d5aae48937826751bb356a69
SHA19f6178f4ab15fe3023ee92c2c2f07db6c7504c55
SHA256789b4ffe8aa61de5838fe2e4e48b20480cd7220484d60097538d2a2b7ab9216a
SHA512c4360829b77dede30b8d0304051bb45eebdeb79a652d5c50bb3e293d18a5ffd9234d543f3e3025b6324a67d7256bf1632ffa4b701fbb1e660bfd93128a02693b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50187c03d17c4dae49ebbb1da05ab61b4
SHA1520badd22a1369083ae301bd44a056b57a900061
SHA2565a730554a1deb663096d56353474ff25a96b60ea1e62ad888cae0b4c04c6a2f7
SHA51240a7ebbf6504d0bdf9ee377dde63cc32c895dd43c8bc4d47be1821f70577ae7286d0e11f5318498b8af70aadd6368914f973009c46a64cd85aaaa8c500688f34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50088c8d48265c9a78a7ec51fe6b2a685
SHA107807576370befe9316bedd75fe0f61a2a659e5f
SHA2561505fdefee42795369988d1b868847b1d1653ba28ccbee4dc9ac0bfa9bd22c8e
SHA5124eb4ed6859138cb5dd6968926ed11320910bddfad5a2c8696275fcecd9e8d3c7e58a092ef358889fe4f5a39990095517148ab5e7723abc4d962024d5ba392c03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5695070f99ffa940fe2fc1797315add9b
SHA13cbaaeb93af34c141ea1412b1f0511750f12a132
SHA2569daf28266a5646ab696a0f3d0679c0d44f4a7c6fe557b1ca39c867e5e4153a2a
SHA512975db1a6a27e8375188b59453d81b20fd3b09213c70fdd85d3a1697db9151e0b017c815a3a6ca9cb162d14160ab3f4276480df3f3cb15ecab78920abaa8e23b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540bde3eaa4765e67cc5fc918d31ce32f
SHA184c0212b7e34787e4d24bf286c1b4f71e571089b
SHA25682011749c47e50407978cb25f40354b823f691fbc408bfce73afdbda1e9dc89e
SHA512329644c2ac09700491e34c6a5b1cb858331f7cb2d90afb32ff6f5935e9416af1917a9792dec7e675c7b1336b702f9fe2a5682b1777012c68c42aa2eac6cbe7b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d6849a1b3c50ce2f2d42286e0f496c8
SHA19b65049cc9efb7a773febe5e6c48808554d2bbb4
SHA2560cec52590518d30c7128c9c785ab22431957edc9c446546a2be75475f73bdbcd
SHA51236641e44ae001c9425b1616574153c405903ab19324d7b13fa5dc92180325264c123637e42ca4e78b1eeb877385e0f2fc8d0dd6da16e71ca5aa862e23cce89a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54331fdff62b8e30788316ab10788cba0
SHA1704fe2e17e3b897b547bc64fc7fd2fda02605612
SHA2566f9aa8694ca70e34ffe2d9e591bbefa8def3d34e39022a693dd4bbd8059fb5e8
SHA512a754ed2759a47f0ced427cb041af84c8772067d153150b6944bf37d23bb3ea9a36d01d6b46e7a4625bd73f97cf528a3a500ffb64e762da17db1e488813895144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585f077420d2fd412401831c2ab8a52cb
SHA1defb5367a1bbd2db136d8d5d4f29a5d0d8b57179
SHA2563e33d82f03ec57c6b077d1766a80bc1e745a6f60f0befd7fecdcea38e19541b0
SHA5127378a092cfb62f687d7d4e59aa6c78cf3410096c6f330fdbfc75d93c6479ffcbf38279d684e99e94ff1df8d78306c76efe37e9e12687849a4c2625abae1488c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58badf32382efa752bc0c69af79920a32
SHA12b15d7298e3519c6ff75eacca932a3c3cb45c7fe
SHA256a561a278ad255f08ff394f01fbed5a29b10f608a2ae6e3b4754d3f654b22c7e5
SHA512ab5c3372f7a1dcf40287b8a97f4bb70a16446eda2d783a6c86170c52b72a270be71c70b34824b6d80300f8ff59fef01bd6972aed46661c98204639ba8344fc5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd05187d295393cf720128c6b00cdc17
SHA1b0b7b884cdf07aa7519f93d8c91f8137b49b4d8e
SHA256a7771f4dfbd5d248aee709123e70f7b9b16fbe9df1f20a81a472f065dc107211
SHA5121c68982508976fa95cae1f73db1da2a5d5e3f623e0e7f319ad21978147b02927e7f5a5edfc7f096f4c56d46456f61ac38abbd18561e29893ec4ab09efc8014f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508eeb7cd9ebabd30f10ba3aed598f1dd
SHA1c180857da2f5ab8f811ab061140d2daa2c64eca6
SHA256b3632a59b9f21acdcc48151fe648131cff4db11a2f1e7ddbb1eae1e019f53c22
SHA512f75379f9c550d341a26bb196b389a67abed08df8ef2579ff3c1f58f4b9667a42748ee02b7a185a3b37cb1f55c94a584c0582e661ee5ac3fdef8edc322000f186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f00c0cf384d4b7d6a5e6aa2ca1eabb5
SHA190ccee0575512491d322fd3c991866709ca457fd
SHA2567f9cc842aa36794a299ffd95aff6c638c3e68aac272e27a29759b41e48745a6d
SHA5123225f5c3550910b54707d88c0d83e244754ad2d95adfa31efbd7147e6bd395a1d139cdfa03f6faad4d32a1f5e11bbb01609e6d45b4e4487f00da27653137b911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db1cbbe651df15f9cfafe76fbc821bf3
SHA175ca3f533b7fb6820840e860bd6334470086a7ce
SHA25608120a604d81a0b8037833eb556c92fad0a23228293bfc98268214ff920f8f30
SHA5128a8126eaff2c2e60c9c2e3ba99517630faa32c7325bbc2db86b465ab729278c52fc93f43fcb8b3d655b512b9552ee32c5d20f316e920bb2af7ea9b31715d394b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3fadf4283954eb09327247d94fd7bce
SHA17193ec9e441bfde0cce7bd5dfdf8c183ab49a3d1
SHA256b4340e5dae1e751e32a37c2a204ba20859928df3efec6d13d0bfcf3a450491ba
SHA512fd0dc8456ef75830eb4acaa67521fb0821532566f847ff4ddc4426b0cd7b54c43a68c875a356aec22fb51af1f2c446304133542868f3a18f1d075dd401e3536b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56014c157bf17403f26dbe7833f7658fa
SHA116a642ba0c9d43fc80b0c446adf36ce6e9190518
SHA256e1f7bcb9819a139a8cc752674d95c11cc0fcd5a8b1b2d7417f6c537a03d740ad
SHA512f7917a5852a76132283189376dc0e58cd8b266f464304a317c086a00f52d7574e446ff951f973d32b9a7d88a615f9d459047c25e30ae3a2f1e84abfd8d58a939
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b