Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 06:28
Static task
static1
Behavioral task
behavioral1
Sample
cee2315f0f318cce429c81fb9c23fb65_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cee2315f0f318cce429c81fb9c23fb65_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cee2315f0f318cce429c81fb9c23fb65_JaffaCakes118.html
-
Size
43KB
-
MD5
cee2315f0f318cce429c81fb9c23fb65
-
SHA1
6523c5d6b30d17e347d66ea261a31e85244e8ae9
-
SHA256
5a56572d6f4a6f8581c63e78e4665887f130e237551fa4680e2d76dfa6c149d6
-
SHA512
f6b269279f0a7f892989a51d36347835f7b329a35a445faa66e9834f74446a2888d8d76268887f80f9e81a0e386f1ddfdfd63d09af0ad82e3ad4f5dc623fa638
-
SSDEEP
768:1I+vbG2+0MGi+vZGIikHhGRGXiOgOeGBGlGslstUFOs/wOenp:K+vt+0U+v5ikH/iOgOAFnYOy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000004a0fb7f204d51b46d238af0765cfb7bda8de6200fe14b3e5ef4af2c75cdcaeb5000000000e80000000020000200000007693d34b183923f104c53f3c048c71b7b29d305fdfebb308711a0cc7db8e838b200000009f475f3b4e050fe29ffcb376950a1ba63b8fc13132d3b54c19fd33daf1c36d9b400000001408b940c1c321e07f864f01c4b87cdd9401d1ea617a2e6d736df40ddfce01bf07cd5d47b804902254bf6c392fe1037a524be47f7295a710a87ed351f690384a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2B9935D1-6C19-11EF-99F4-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431765951" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0c8d2012600db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2464 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2464 iexplore.exe 2464 iexplore.exe 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE 2280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2464 wrote to memory of 2280 2464 iexplore.exe 31 PID 2464 wrote to memory of 2280 2464 iexplore.exe 31 PID 2464 wrote to memory of 2280 2464 iexplore.exe 31 PID 2464 wrote to memory of 2280 2464 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cee2315f0f318cce429c81fb9c23fb65_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2464 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d0c7e62f6e7630516c1c5bfc5a87911
SHA15db2f5079ed962bc6c435f8126cdedeb62f2c5ca
SHA256c3f22417b2fff13ef9f4f2c8bb49ae1a7e18da5e2bac9fa4a036942e5cf86db1
SHA512cf39a4f2e54f484e74b5e10fb6bf8f626eb33c03f8e3f75af8d67a338518331a5f0d82f11c5da07f3b43c045961a8210dd3618784845d5923677c96bcda65c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592bcb580f5506fd0439c21d98aea3acf
SHA1ee6bc9836e1e448163c6a444c0d149c7d78e1daf
SHA256b84bd263ce8291ad7352d6cd6a9bea2c6df945ff3fcec92a659a3f9d5bdc1554
SHA512ea0839dafa1aa2b85ae044448ccefc6729972e1ad3ac61642a633247ca09f8f8752777f30afb08d9791f361584341ff4698dabbce01ebb46a8374ddd60034048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598ad5ab7f2dacc9597ba6d6946846ec3
SHA16a43e0562e53af4b80e4184eae1ba232df4e9251
SHA256d480f0e89a42b84f2ae565609d8f884ac2571c81b22524cf5a4d749bdbec3b43
SHA5128058f2d7c1ff8dfc5e4a210fe5d237f45f40307cd49cabd4f354447b87e40b7f98093550d5d367779a6f460da1cf52d59d44dc71be5f54fb40a8612ef0479e96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1a53aa591b99551dbb0111fa741e19c
SHA165114c6f3b5333e70423cd40ac3a52e99da30cf4
SHA256b6e444fc78382f5c4886c923306f752bc80bcb0d667be1c6ba24266c8d3c8fc1
SHA51256388350386a9324002799ff665598627148e58fa31826bfb5dd597d069b8896bad43c70dff96236d72224eea2762cfe0829d5167813c87f95b6ee1a1c668518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab3315557048bfd40a43f0d48f043b41
SHA10f0e449f3a6469132d4a5c1825fce572cf0471b5
SHA25662d59bc3e88a91154d8462385c372a95e57ea22cd9b986d7d1ad5336ddbe99a7
SHA512c7371855d23096bc743987ad4fd4efed31153b0dbbe03f6ed28e12cc4f17a317161d4feb34903eddcb2c4646d1beb9ccf5d91e5215b429d1b797f7b8c99821a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5624a6c6278adbd7f82fd978afdef0db1
SHA181cff0b59b48619e25cd6bf403db99626289920d
SHA256d24c11ccdbe99568dfaad1552d4190cde36216da2e844f54572a5005eeb66f80
SHA512d383da0a08441040b03617f6dd1e7c7f411dabb2d524ede68aff73cfd6956d3060cdf185e9304f4514140e45ebbbeb82839b3fb294a82e08ae4291ed1ac3cd14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596cf1dc4bbbb3102c79490582ad938b5
SHA1001e37f64939d263cc3661a1ea7f18ac4a14025b
SHA25636307758560cb815867d2ca86f729a10a0ff1b1f02c1f6489bda37cf20350aef
SHA512c136af1fc2e3deee9f50d82ea7258af64a0f5dc323db194e7a20db929fc4259c614299a39416df70cab0036a8a7aadb6036b6b14a072af48be5cbce777b0b7b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5024d5114f3bcfbc33a2910920d52e574
SHA17dace186a9861092552f5a036ca0423aac421d8c
SHA2563cf5c21cd3d5a0efe9f094753c88a0b4ecebc36102274f11785b6902943fa8cd
SHA51243d123beb627f148fe2e161891c5d0a7769e465aef1a1a9ebc83b037ddb3e7a4f6b8d584b2b0d0efd1f2fe9865d479c670e90bae57d225906885816ca91aae1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549028955cd9b2e4594c28fce7286e682
SHA165b16314332c0ef6d15544d015c3db36e8e0ffc0
SHA2565c7478df79eb33383c92c0ca4517bf2607757c9db09f65871d142c983c332081
SHA51221f24c237191a3c4c2a7abb81d6af9c35bfc414e396e61158020726410d7327596cd61b77ac8fa8c0b80b8cf7204122a91d8ab83b5f7d0f57ae236c153e82925
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3aa0a6393531436236e16aeb0ed8872
SHA15f03d2a9b8d8bd2c3fc000a0126dabdce1f5f00e
SHA2563cec3643c744479fdeb9cd8df7e5cd1d21ac4bb21141ff0d5e456a045e2f97aa
SHA512f52a18cff00f3e3b9ed56439e378c7df4b371a332ebb44ec521aa8b694a4d5c0f7cbee084db9d08ad04e886dc3fbd065c08678689c5f01c94089fa0f26a1d027
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e050a403e4316fa303cf0dc75cdc2d5
SHA153ae619666d4aff2f7b37ad6d2a147291f73bea1
SHA256490da289760d903683ea5bc4a3e2b636579b4f93770e0ebde664935cf97bfbf4
SHA51249a441252de9f4d00e388d8f2fd6138083d2f1740f62acfd6e0529a68f9d114cdd9b611193b1698e8c1905bc1f20896a6382c31afff4bf904dd63e029efe4e05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbbbfdc36fb97278f3f1c4a8ba7a2001
SHA1a58d7de76bc6205375e190c700a39b827d7b4e12
SHA25684d40664ab5425e21e18b7e41d1551a681197c1328d9d4b0e4bacad9f47df2a2
SHA512c38f67e418b59fb93c3809e254d59216db95556ee05b0f187a6dfaeb372db4d94faf799b73e94a0d71bd847da404bf4811d1b07a2defd4953e961b14cd697b6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f119d422d4f74984bc9a23ffd5ead3fa
SHA1410169779794751f4c43a982e880d54f5d2049d8
SHA256f663d720711072609296f00f60ac3280685b535fba5959ed36e35f5efc71ff2d
SHA512094bb988aa4badf96ca833f589c0430726e887c09808830ffc5f431039af07cc1126fc6162025a919ac4175d86fbe0109a1d9ba789859ec18cbd24fd4ec96cd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e76fdf6b901c4a68b5abfbc3797adef
SHA11485a4b0e43f305dd8cfac4674e2187aab67426f
SHA256e216f41310107128dfb8f97c606aed3bb30f84875fd88e17632c9c706ca908d1
SHA512e11543a3742a0fd7d844062b8138e874411de46b44c984b2bf51e9facede29bd52f565ba0800b4aa1fd541ec0663c26a4aca60cb30648c668ded4a3779855dd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55edcfdb7939a97231b108d21775c2d46
SHA16e21c7d9be228f7128363c44eaad81baa4e4319b
SHA256e7203c7c3ff750fb8b0eb74c495f5172d78d073cef0c64c19e730205d87bd58e
SHA512a547c00cd03d0410768d21da82b278e6aff8bb9b4be6e655e32aea825c96bdb0be8de6164366aabc5fb3c08f47ad4ce7040c843c63e5c35dc3634c89d18aec00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5decaa158da081ee2a1dd859d9a94792c
SHA1519199079eaacdf8c31ed21e2b6fbbc1f10bcfdc
SHA25658bfd426ea7c4c77078e8db44cd643c94488d17d40b1eb98bfefffac424fb1c9
SHA51262d55dee1b518f3d2b82ae7dc8cad667536464fd022760ee37a0bddc2bdcf64230e9f95f86a2d7f3992441befdad874c5443a90f6a87f258b4a83c209250ea1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a2a0e18070debab7888cadce13e16ba
SHA1851bed8e47a8338a5e9f516dc20e2ac65abd8e7e
SHA2562bd2687942b660f9f26ed5a67d759e4475698987bc7a345b33938533ca766e0a
SHA512e08acecd5be243820be2a1657f599ccc8c5e7c31d5c8e5991784ad819ad2920b6deb9630cc8b5867b863349ecca214017cef40100b8aecfbb7b498660ed102aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bf711daa5494678e929d17c24328494
SHA1e42d7bb434b04a71fe2203a97a58fc81b365141b
SHA256053dbcd45905a01ad20208f2b0c4d3290eabf3b13c65bff3004127fd05d5d70b
SHA5120815bba051eeaa7dd7e19d5f54c5bb3ddaf69f36b64f23affdda2ee8f48e12de37cda47fbb77174ec5d3584d37b4c906077941bf01207240d58db16c6728e14c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503621a8ad0d96a5247c57e92a923f6b4
SHA1ac5cdc54f0a21d4c86a7fffe87774b09178cbfa4
SHA256cd957547b19c4cfa92edc6f70d98e8c2e87991b6066257460667bc25fb21821e
SHA512655394dd5808995527cff4f60fc66147939b6aad4637f42cbf540060da8ecdd6a203ea300c0508820b6f426f133d23001ab0c66883a17a23d8982743959ef180
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b