Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
100s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 15:44
Static task
static1
Behavioral task
behavioral1
Sample
b40f17bec05f7ae0d4fc3712708f3c3a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b40f17bec05f7ae0d4fc3712708f3c3a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b40f17bec05f7ae0d4fc3712708f3c3a_JaffaCakes118.html
-
Size
20KB
-
MD5
b40f17bec05f7ae0d4fc3712708f3c3a
-
SHA1
6522e1c449b7ca560bdc3e5394dc09454ffadd0e
-
SHA256
c1fb7fd702890d1260ec458accf666c5217e6a558868c9acc5ee82fe308f3513
-
SHA512
8facf6e50835b4023545c29e4afb85a9e948053081b8e5b335d69e70ce70e81b708eecf9808e979b7f67c354481117b8264aad5f6c9ba422399c202ed104f2ae
-
SSDEEP
384:IZlIcgt34GRGTHnVti6a7Wn6Z88/gbbAguLZ:zD8ygnAxLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000c6c29716ebe5f943771e59fcf3d1d2b7ed9d1a020c1980eddf7483ae8406a590000000000e800000000200002000000091009566bbe18307ca4f290ca8e2cbb54a78c59bb11283344319d48c70c66cba20000000138cb4f9cb6c7494e0558e73fd552e08802a52f46857ab4d7bc6624a0b4bf2544000000062bb7b87a3cbb57e484014fcaeda1f01b25233855e6867d2dafe0d0cd8159fd1bbfd14d32af9d55b4e80664494fe6574a7ee2fa3cb27cb789caf30f9b7a4d10e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000d8cd1170b5636215666f2319bc4ae509d7d2c20734c75c1270c25131cd17506c000000000e8000000002000020000000504a5f529a7100dbd080f4be1ed298a086059e62a09204c225c3b77327ad9ab990000000d267363365fdf40470a5abd94a02b14dfd33d5d6289df3eaa75cdc8015aff71c7afd16cc72dfe8eda8f53d247be0caa9edd6ac02e7fc5b67587aee8f653aac1cb2a71326ad789fddf526f9b9a90901983a2b1dfa6c85e15926bdcab2f856bced5fdfe5c3c2860dde1993bbb27e6661673974ec3d217b8a4143031d09393e148acd538ec076996c8912ab2d81ee10c983400000001b88fc46ed8787b00c82e8d3eb8075c943b1ec2099f6648668d920d664fcc5cd73e013b9cf3a878fb849a7454f096f6a3b555ce399b21c9ae57a60350028731e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430416934" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3E229D01-5FD4-11EF-B99E-46A49AEEEEC8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90afc83be1f3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2028 iexplore.exe 2028 iexplore.exe 1484 IEXPLORE.EXE 1484 IEXPLORE.EXE 1484 IEXPLORE.EXE 1484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1484 2028 iexplore.exe 29 PID 2028 wrote to memory of 1484 2028 iexplore.exe 29 PID 2028 wrote to memory of 1484 2028 iexplore.exe 29 PID 2028 wrote to memory of 1484 2028 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b40f17bec05f7ae0d4fc3712708f3c3a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbac82f88861fdbd33b8fa73f87a2591
SHA1dc81534e65de9dfe1444825c7aa03fa78925d6e8
SHA2568b10bcb11d8d56d380454e49d212b4dceaffb495e7ea29b3c5c700938dc17ad3
SHA512890af7b02fbe5637dff2a1665b36cff54953dc7a645c02c4ff292167e206c1c6b3b3107025503d7c4e17d70ce75c92f07f5318acc8ddd58d6df6db7a88c526ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5cbe7a72b024bba82d61f27d31bbd0c
SHA1f26e2944b95d51d7069bb37cfcfbd844a0f58258
SHA2569d025e7ca93fd53892ae3b0695d194600da4d17286dafb64dc373c13d3e20244
SHA512636b18de4b3760ba1ff6eb5f503c99a84394aefad8ead4bc73cd1575466af409e8f1e06c155e5609091b77023feed6ff70c693520f92394b3449bc0abd8956b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5991016665f207fc29c2bcdf359853cfd
SHA112ee794a2c0f933a6f633246ceba5d4ade943dda
SHA256110734a445ccd54372d228aa8972d67d4c1aaa2ffdeb9f01fa47900ff677a48b
SHA512d4f8b29d812c8169b3d9110c0e6b69b14c1fc6cfd54de1dc24306c8436e8c2c234420097eef6987f384a18a7871468d9c4c1a5893602c894d9501fa6e9aea115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53259bb92fdd3e3b9c1a62b14067be72f
SHA1b3bcb006efe39ce235aa552d76639b8e4f288084
SHA25634a3260b8ce007c06000c498019553d328067df42f79c7038cfe149a3b418ebd
SHA512168910443f2f4a1ddbcdde26f3039ba519b9d162e0e127bf579a7e3822fbbfd7f131acc167ce993e5b32d449b8fef286e29b92ff4bfbe752a5a8c0eba03a5391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2371eca67ad417ba7116c54eea52f16
SHA18fc655fe37d04d8e797045af72452273ca84fe9f
SHA2561164e0d207f8e3d1b57a5db8cc823ba7f429ad66b98163133450b6062f5bad48
SHA512c003d25de4fe7b02966f0494ef6f622ea3b957ea3d19efdee9953ec3bf13ffc3755b39851c4d49d4a0a5860d5443922a53c33477eb58def084f65a43917e3f61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeac1922787f2022efeded9477f38680
SHA1be2b512dd8469fbaffc5cc728d48c3426e18c0a6
SHA25622f6347d00adcd1cc662dde7ea6f8c1fa6557f128fca0b08a902d8177ed8709e
SHA512ea244fccb38d91b0fa3ee89df3dc87f05721cbb05cb205a8d23b9dfd39a50f253d892f3cba73d67d11f5c97e73462d1469f59d4e716b95b2ee34e5cd05f04280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b33773551c405d9fdfdd64a861715af5
SHA133a50b9bb2c86a82ec9d352103a77c055d77f188
SHA2563c17cb8c79726070da1ba79717083346eb2dbd2fe29aacc21c29d9c00d5805d3
SHA512e36dc1f3bb02404bae4c0b033f8e91b0522db1c7cfff315c051234e4cba6483ac66f156467651f8f441b9f920ef0e3139d8c1b097ca0d008557bead5c55fae92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506fe8f183c11cdfb033f5e5c7ff17d27
SHA18c48aacc2b0a76cb1c90e01fa680eb72232f2bab
SHA256ab0b2a6b59efc1262614dc59a25a890f252fd371b61ea2b15a9f53552ff17a91
SHA5129e627ea2c4f57b64ef01a5a77441c37a2592cee195d1d7b02b0cbabf3734b9e0bced7a8a5f9582bb2548c7fc236b041845dd23a0086c067bca0fea052e75d464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534ee1b93af6caf98e34b9877e1e7d104
SHA11fd092f61868150bdaca7e8d336b03ec9325b119
SHA2566085e3a0cf78bcffe253baf7731ba4ce04796812000ee2eefaca7ffa0c1ff6d8
SHA512a920a9b9a38782dc3e8f17d76f9f1ad72050d0e9590c5250cb5317d9622514c36fcf2b2059f03a6a3b23935f7d3532ddc4818dfa0060424ef2cd077c51b9dac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf5fa2cd6a39e66b1192ec18c4b99c74
SHA151f75ce08cf8be019b6b3f1c80925fabd3888a2c
SHA256213237b19633f9364ff9145f201b4ebbb2f98c1315a3be2e6777dd9c6b6ec9e2
SHA512fb6150e87587378ebbca071f80f8f2fe3c3ea63893151c9ece0cd5d4e2e2071e35fc89a2c08117cd7476ed159d6137b05411140231cab39d6eef3cb599b9c745
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f8ce62669049a6b3309fb9681307fa6
SHA1ad2fc4849e76b484a6ef9e9ac5203f20c03c0b0a
SHA25671e2b0d349a74286481a9ce64f8bfacf57763d6fbd86c4d6c5272cbde2b7b1ec
SHA5121fbae546442d2c6e359db33fe238e4ef64efa4ea8b283f0570523fd86124f3bcc4d7f002d0f732a039c635175a1be4d09235d8d0cf0e5ec9d4d56187fdb5590f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c424ccb342c2cecf3a6ba20b3fa001a
SHA129bad7dfc9162a5d6a5de383e6b0d0e474b154fa
SHA256a275799bc9f148e0990718175b81a570f45b02152da083cb3c729f6c28bb376f
SHA512d614028f77c1eafc8e523cc4080d630b0c4cba427bf25c49560d708b98842d51741be94fd624ce08dcd066c5a837726265b68c14fea55a408c1bf4dad901722b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52732b1ce95e00668420c8f7fb5699ebf
SHA1d56ab12ef9ba5d82c38b6ae0722ee935922e16b5
SHA2569b70844293a848d243f2af33fd2966af048ba4bdc7565cb08fc5d012ed79b662
SHA512ba3ff541be6ede8a54068b206104238500002f552d49d3e057e827f71b11530c5300cd9a848fe61398a3853950ce09ca1cabcf59adcc095ec4674719f9b6ae09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561316b804f069054ccea97036a4b922d
SHA18a58345aa7618ba03fa4481436854544e1c46ff4
SHA256568e345493e1f3971142db453e28ac4101e42212cca5f25c47d4b3a80b7eb5ff
SHA512d5441df5dd03ad282f7c82f26f190ec27e7f3687e4d6afcd36148d63e495c4392df88a7ea1d3e9f250ea4e8f2d694d0bf2a3734a4c5ea47cdf624b0f5a6602a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2da43ee1f1ae65bb7d6f23c90742a1b
SHA1cca1f4f9968cf1d81efb0091552b518d82fde513
SHA256e3cf25cad3dd5d43b532f9ad7fd64acc0b19cdede5e6cebf98b95cd05cb08b11
SHA512874381055f0e250a014735c9170d0319ced258370a08b782c4b6e883efccecd0388d5ed279df6d021bd84461c7fe272e2504414ce7b05a1b301fbcd67c4583be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592fe82b0f15c8ccdf2765e93c51507e4
SHA10f7545e2364f4e0857cb28255eb851d149c3631d
SHA2567538935cf7025bc821f6642f32f81275fb505983e6edc9a0dcd0ae6e95d7a7d8
SHA512b242603e579a2ed93585506524bfbf6bb27c69026d4c5494c2e28a890d1662bd1e3d1f8e5428881aeaccad04209b21ca41d2ad0bb6b7278aaa9a629a36e12533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573b444df5b11b579d2ae6feeb091f3d6
SHA1811d08508601503795341fe70ecb572f113535de
SHA25673a80cbd318b06529a2f3e4d867d502bb53d9c8169c775fa5b2fc5736dff031d
SHA512d584a8c59c8679238eba7d82ecfa0bbaf9a073e3a6720f141d12b6e1b655c655fe1cf343bb0954dbabd4298cb88c0db5c76a54dc271ee0e0f52984c66730f716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f576e07ce9437e265104a31327467e9b
SHA13197dec820c4262550a91faf8cf7015ed336021c
SHA256c2e21d5329a8d2d5cb10f4462add6aec61e09867c1fbecab41de043ee6b7eb52
SHA5121af8379a877a55d98840270e1a546636c66ea7f90925140173a8093841346d109be01bd15e8452db0f0648cf6e54ce68eaebf84230869c3f9d082b3f39efc8cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efe22d7462d082d7be7efd428c38b09e
SHA154ccf2d3e7889f8249fd3f24fd75ef60c0a07032
SHA2561b4a791433d9bade8b93a2c9f8ee943f7d26fc43992ebfd84f99cf601bad1b8b
SHA51248de45012fced92d3b693c9f80988fb0e03131449eb7ec958e1b63f6f4cdccdcc04afd30865543c6746b16e3b670962da833334bb96141221ddc6db996c085ea
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b