Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 01:20
Static task
static1
Behavioral task
behavioral1
Sample
c7fcbb74b5bf79bef0c994d8145d8e18_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c7fcbb74b5bf79bef0c994d8145d8e18_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c7fcbb74b5bf79bef0c994d8145d8e18_JaffaCakes118.html
-
Size
4KB
-
MD5
c7fcbb74b5bf79bef0c994d8145d8e18
-
SHA1
6289c6e33f9b6c433795d4b9422f0307445e9c4f
-
SHA256
bc80cda258fbb588f7d68db9372b7088b89c01eea707f2f62f920d9dce6c4173
-
SHA512
7ea84de0a9c3af031c7b59545e23a8ab353a5f226be2d5370c1f22f968bfea698f8fb1cd20361da34a007d8e733122f50c427884d255ca1ee1495d1d1c72af5b
-
SSDEEP
96:ziEk+HZmV4MSEPBDvV0n47ej/hgOKiljSR1QnyneqhnnNm:ziwHwV4GD8/h/KiZwQn/qVnNm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DCBCD721-65A4-11EF-A87C-F67F0CB12BFA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431056290" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0f4989fb1f9da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000403673990c476c479bb228079ed04761d2983a6267c1b5e4605541b071369bc0000000000e80000000020000200000006153c218fe0e1fac31724a58e0fa5d7eac3addf28a72f3b977c7810d06669d8b20000000b34765da562f2638fdf566ce84b141224ed9efb9ab4d876284e758647b06284740000000b18f42eea542a0ffcc8dc52716b5b49b8f558f5b54154f162a54a8ae308960d8c7639496afb5d507a12f8e55d9a4c857df4fdd5c79b2744b4da9cbc22f23e489 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000006a11475a3e2b3a27af15aca933261c2819ebd4a4018fe7df26287d8dbec9e9f000000000e8000000002000020000000a39e8a43fc48ff09143edbaaeca073041706d2cb9b8b43625ffd81dbcb2410a69000000047cd0391ad3461cd0db809f973ab8e9fa87c697189315aafb3b7a65064f1ee5732c5fa30ea8d7cde6f5524029f5cdf34084105dd3da1f92cc6cca5fd9df305bac1a1bb94211bc854796746463bd5e839de2fd5791ffc4e17a6a69748bbe92f1ff04dd5b64fc20750bdc36b24d5d8584fb2336f819a0fd34a87ad7d8398ea0c258a56c9ce3b4913a36d5ba6d3646e1458400000000d84817dbdf63d24b2e12e0a46a3674449a2750d340793496ed15e003546405eb169ab525e934049afbdab7a086e7aed0a9de8562d334fb82195e8a31a185379 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2704 iexplore.exe 2704 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2708 2704 iexplore.exe 31 PID 2704 wrote to memory of 2708 2704 iexplore.exe 31 PID 2704 wrote to memory of 2708 2704 iexplore.exe 31 PID 2704 wrote to memory of 2708 2704 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c7fcbb74b5bf79bef0c994d8145d8e18_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2704 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD584483cc18f2fefbf64a38ec2a5621da8
SHA15bf5125baa5e16eee91eedc9cb83f019a25aaa1a
SHA256ec3b02f23200492e6d8257c76753d200c9b89e5f99f74a97d092ed3cc742847b
SHA512779094ac1e0a2c4b93ec62aa414516a912cb7a48e3127feedcc0cf772ef4d5a0244b1a38b2fa763b9d316c2c516d19adee82ea336fbe98e0d92a8f39b991f93b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53de34e8851ec21f90cb282cec82917c1
SHA136a41dd65e594a2b32ac6cc3b52f030232ed3bc0
SHA256d55e4aed52dc0c88ac4c904f7fe70e10526c62e752faac1f3f7b85c8b827de7f
SHA5121490d36b6ced3fcc3baffd3748985385ca625d0d0a08fa0458268ffb0f78a27672f4a73fad36e61f09ec10d98e5b956b190b59da892f9f5d48b133a67733d957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD501a206a9d356b64889706b0a10166a91
SHA1ba1d91ab22ba758846f342bcfa310d0f35fa7426
SHA2569c7035e6c6a79a81906646ab231cf1c8240cf7198e0ad03766ca087e69c90ec8
SHA51220bd5beb96c002767a394703f4905b2ff275ade05d15a373d7a9b8e6a6a9cc4cc2a98255d73250b99cc2747d9d2a560c74ebeb2baef7642cd12a47aa6466e875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD599cbe0fe9dd6700a75783e9a4f19750c
SHA1e06f1037cd85783ad83c2755c86ab9e609a118ac
SHA25649c0994ad6c73749d87e762a1970b8a7cfcf3be69a662c1792bdba5f4324afe6
SHA5122ff122ff29b8ce8f6170a1450318efa8c66f9ca87abc5a404c908c4bfc19c5e6a60bd92bc26c0d2bc874ae9cc59a49e104d6ade47f620f02125d72444accb9df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD555164aed8b55a21b7025c537c7dbaffb
SHA104cb82a787d3a55bf8be9d0ef1f522bb344eef8d
SHA25646a8fc217d47ff1e591cbb88115db769b12f6c482f991e75efb61174b3a7fb09
SHA5128394c5150a1fef082c6e1537294073488b4abb9860601665497514845181785bf41cfb7e8c7fe8eb3efbec0cb8388048dc8e65443cc471a291b621d923f64b99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59859186e718b596107e74e0e547feccd
SHA134fe0047737d228835510986702e0ad9ee818c8b
SHA256b231f0eb44626d9dcaadbe6c7f0ea625bd1dea3226f7e6440fa6cd0e33dd998a
SHA5129ce13cdf1f0134fcdff1684a98fb31206a04d4b9c81971ace395c2e5253e8f38a23b09b9f1299daa38b64fb05262aa0b50d821bc336233bb7f740ea04ab2cb3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD581e8b5120158d751758678bc9c668cf0
SHA129b22eeec47a4e34fcadcca514faa8c201aef6ad
SHA2566cfb2d103d0a8e491561a8d0d29bbfd8571a40534969a9e5234ea657e2437bf6
SHA512433aca68d5ec263e93a98269c4e5d65f553a1cafbc849d847efc5b399ce9cdd74c17f4f22c8b59e9a7524c557e0decb99b24f36bca7b30f1a6fbf11b91d810da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD551d9a84688c92c50c6384bb24f1aa8da
SHA1a9d69287a54ccb1ead45cb7e82a0ef369f11d45c
SHA256d25c89a2e993fd2cf4e0415ad01bdd0a89b2e8161a9e8a6916b8ba8b8073b793
SHA51208e802420ba6d869666a97ebda4d5bf3e52f9cc45d1f616dcb7c5e3895795b64403655a4d793168d77cd81ec8cd64253401a3dad39b81f474215729a1a4e6800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cf2972a03ad95c2c0649d1f98b427902
SHA1c2b13862ccd41ecc116ecde333cc10c68d7d95b3
SHA25606bf77d6d98681df8975ff990455fb3d9d29e7e86846f35692d82a0d10100553
SHA512c2a5854dc675cecbe00b65a6a04c28dd1baf698b69afa819dd7f9a57d45249b6f406f0571d6124814f398d95e64dd33e33694698400a51e5012c893e371a9d6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b436640d67a376d8c4215f23889e7e66
SHA13ed6c10e41804d6c30c536ea3ba2e3d477dc2d9b
SHA2562d71e852339ce28dc3783a1ee1e0362eb9dac865b1f69bb8fb186394faa0870a
SHA512edd1b7a064880ada22684b6f36742a8e3329571b531acdab8583bcc8b4c02200ca378af1f5db53fb10922b938fcc2ee4322ef669a6efe81fdff0689dcf8edebe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55e76c24d128eae7e193d7394c6aa9087
SHA18c937eee1f36f563b0fef98dcace1f1ec64b2773
SHA256ecf9f01ec503e64729b7a736f1766ac5435a2e5c95728899d5f4e49b2091f60e
SHA512d17938a23b2fb372fa8b5f0dca317f383ef5782ae63ab13e50c7cadd09e57a843b868b8fa0c686d15a15df570e274b8896f720448e960875b077ada3df6e8932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD599d05f65deccd0d2ffad32ba7899042c
SHA1cef2f20a11dd4e8d16f1b92a6f0eb2a718a8da4f
SHA25637a44951b2ca4a8df58c85a990fff10ab15dbf0ee220f8a9d3e9ee1e4d943107
SHA512441fd528d52d65345198c036fe2a6d6936339108e6355da1c8258f276347cc685eeb91e37ed68c4d9f759e3232d5440a1a9ed1dce738108c1a905a9d65503cf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56981581e20d7cc83690f9d5ef4cd4052
SHA13a9c2f3695c1531fc56c0c87f326ebbc483e938c
SHA256bc0c8cc96f4de2bb8b9d030f48fc0c2df6fb2bf17fad68ee276b8e3e6aadc3b5
SHA51236e28d1c28a0ce186fed3390ee1a36c19fbe69f6d9b574e5c7ccd274c874b1120c6ed610de059badb72b41afa3f54d2c7276be38f57dee3e694cc2170d0605e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5185149adad012ad3f94790faae031774
SHA10a94a6fac756e893cd249e5fa02885e331b2df5d
SHA256488a673ce36eea85485d312a6db506c0c7cdfe903cb125502fbc099abbe20c71
SHA5129de2ae1e47417c52113b27c1ecb0e4d24ce0636902fdae96b750810a2ea42408bfbcb979f663930b377eda71a54125717ad41cbb604c61206e53aa129a9e7da6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50a6f84c9680477a3258b9fb632bb0892
SHA1eab6cd2be96e278c427e2fb37116d3b04e52256f
SHA2563c0e4be86afaa1f2017037716bccdd9c7f6a9ba98cdd508f6dc8be2dd0ec5ba5
SHA512cfba62e32a5ec9156bfad3d203c66135bb4104136aeafd7f7e13ae8db82d6e0afb9ca6bf7849907b561e83c2c62bc5d97040fb9511c06c37f9af111778753af4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5464bd96d938bbd6b276ee36214a08679
SHA17af69b43d9beb3641034512e11eca3b6e774a2d9
SHA25606083b6ee9807ed80161f0f92f00874b392b62481be5a45428eae7cbf1c1d2a1
SHA512d985a60e73769af2d287fda6aba3260c8e142c0bb32f1262b8a73e78f302b6d60575fea10c66c260e8ab143adc6cdd7e67b4e292fadceb6ff090c97f18134776
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fd1f9c80b3c7aadf7808c1efe4377a8b
SHA13c43c1a9ce30ecc1612a0d2f0eb97b44268fd53e
SHA256f403988cb92de6c1a001600fbb807fa908f379639152cbce4a6b0ef56228e1a3
SHA5121b79ad9e00bd8a680e0e3b063b750ee5886570cc2c90f1e4050a5ea39ba850ea3f4688a623d5149980e54f03629020752dd9524170cdbad05903d3e16ced1a7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5803005bff5e38936a95ccc1ba5a525ae
SHA1e2856bafcb17a183dee2296a0bafd598d9cdf150
SHA256914ab67fec1865cbc598dc0cbc54dc64a704798af3694d89ad11b46fbab53b33
SHA512dd0d1bf16971a2b40799ff86ab255bce04401843c2d9f9060c18aa3b6d06a7ba739ab79541c5ba49e8073069adab9d3754e0c12b1d6265f013212542fc626e08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55bd8a51578f1847bac8b724b1b4bdce1
SHA11e2592e2e8f4d930b35bf7e2a6753d0f2e691ee5
SHA25684a2264fb848ebf1126565569572df2d62863d4efda96469706141e9aff9c6bd
SHA512205044c63bbf9519fc8393fdd4d317c20714f23ca883dcf3e186a2f8295c66a8cbaa2bb2edd71934bfca2b224f8869cac5186b370823962e3d2944e2f73dbd79
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b