Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 00:36
Static task
static1
Behavioral task
behavioral1
Sample
db8150df910d7331bf9e6da9358b0e65_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
db8150df910d7331bf9e6da9358b0e65_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db8150df910d7331bf9e6da9358b0e65_JaffaCakes118.html
-
Size
230KB
-
MD5
db8150df910d7331bf9e6da9358b0e65
-
SHA1
1d82307bd9b5db2cdc89b82f330d374a78694488
-
SHA256
e37bc9ed71f62c89638f1573501c06537b0d90395d0d4a2cdd74debe1d4a4bb8
-
SHA512
835c45ed0027328f5d6ffee643f372e0e6b3f977b3749a0b40bb38b3372063cd719f68a3349434b420f0f9a0e9bc752a2ce61980624edeb6458ec1cc63329b4d
-
SSDEEP
3072:S/xIyfkMY+BES09JXAnyrZalI+YuyfkMY+BES09JXAnyrZalI+YQ:SZFsMYod+X3oI+YLsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000007ac23a2b67cf7d2f061ac73262f66d95dfbccffd11da303b317ea66ebbddd55d000000000e8000000002000020000000bd9071487a320d1c9aba3c59b6d179e8ba1f37f66b55a7f189903e83ef53552920000000f177f761f91a59224398e307fb762a282606b75014a4ccc244ef3ea66c7c9b1440000000585a259be1937d10fc84099e31e8448fe8a2d7950a84b4704332b9963ea9c142df03eda26bb07d9d7c9a22818beea241a1474150a27007e0346322cd3357c9e7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 202e94eaab04db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432263272" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{16078FC1-709F-11EF-B692-6A8D92A4B8D0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 1728 3012 iexplore.exe 30 PID 3012 wrote to memory of 1728 3012 iexplore.exe 30 PID 3012 wrote to memory of 1728 3012 iexplore.exe 30 PID 3012 wrote to memory of 1728 3012 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db8150df910d7331bf9e6da9358b0e65_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54be3b8b43e9f968e05df499e998c3ca9
SHA178d748b089015f1cd75b159f7fd1a166c4fee0cf
SHA25613e0d4de7b4f18f990cfd3f4d434df20727bd0e271e47b67b5c1ce5a43e437c5
SHA51265c35f8bdbbabfc7367436e2e79551d45386bc7a7d116da6bb769d0a7900ba980a2bfd2d8ef1402c298c88cb3026f779c65233a434507e6bbf22881bc9f116fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2b52da3e57bd63cb65aef230516351f
SHA1065eea05b7e1f6a17bfcadf157b32e5a9c085a0b
SHA256aceac51dd0a692a1ae00bb7bd4781ecc55c41e2ac353445d385339443f5c576d
SHA5129f414bacacfae31dbba27edeb6821f5316fe1ef4385fb38ce79f296c82e74b30052b6681337b80ae4a12961dd64a04e2705a5c5704dfc4f6c53aca4b7d651724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cc99392b7a4ccd5bfd0e48e44dec8de
SHA1258e3c07d0a883c929e1d255048089d25fed17c3
SHA25659a12e13323ee36a98726a8801ff9b6434a389db9bc9a4348a241686b0fbd189
SHA5126ef291caded14a26618321b08a22c11f13ae4a4e657636f17a49637c26582ba6df98f00d261540b6d8649d9adfdfb4ec76f940e7c76735f589290d217d4e757a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557bca385e1f3b1f8e5f25829fdc01152
SHA1e9e0709b218b9d0afe77e487e22dd842684a3d7b
SHA2568ffbe280c76d79ae921723b68470c8222ec727a040a1e42f183af3450e447fe8
SHA5128d3544f0054aa0f542137819196c5bdb8076a22de3e54e10cd193d5b3fbc4f31adf3ffa5bc97d7ddf28beab7482cbf37592a5ca6f7cec049d767346309f83aa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58807880f1c15072b363c57301326d600
SHA1cee04b9d51d6cf3182afdc9f1b0b4d616ed5f4ac
SHA256349f25e0f73d2d7fcfc8f6a30f3796e21ecb771f5d36e12b40d9610a225f49ca
SHA512291ea1020a4bbd8447b83b4e5397138b22cee4b07d14fa9c434448203178284c91034893fac6731937f56110c7d32c9c821ad3f259aa7cfb4d8abf7605e7e5fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515d3a90dc3269286ba1fb688151bbccc
SHA1eb57cfb21862392f587642a69e4bbc91e81d0d58
SHA2567efc3e8895283241a17e348c4f27518015c723fcb76062557c38d85caad4555d
SHA5120a3867d5cc44843dac70efc078b94bd15a78f2f6bdc6491919ce243d5740b54fd8aaae3cd43eeb38d3ad6411c3dc84e6e1c13b7ebba73e1dd6f9852ecd7fa4a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecf1a986336641a191fd9441c5392122
SHA1fb19e26b99515d8e162c076c8be0b2a27bf16b8e
SHA256786c0c329e569ec6240f8a48e742bd51caa4fcc4a3473e0f7f14b4e3e01475b5
SHA512b96d0342eae6d05fdf891b6a936855c72df128da937ac86c0b6a87d3adeca0a97d1e283937605b13c6a1cfd114855d43f857e6509ab658912692e8d78a7a3998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d09c03e191cf66f3f1d42320a38f98b
SHA14eb776706c5682915192ea4200f5f365987c6ef2
SHA25647f5f24847267dfaa58cbd20fc3fe39059cfe21fe1968ff208e80066a0138621
SHA512db0afbb43e9d2dba9f69253489df3fb3d06e801d41446ab6c4d6d633a96f107fba10b1d44ae5d965d322becc1f184d362574798079373bdb69c4a4a81f900313
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5003e12c989bd99e8dc61d4169147aa72
SHA138c4420ebc36b33b45d553e3d0ac1bb5c8b91c28
SHA256c4b50641eccc8b878ebc2fd6b891f6b5ca068a469d59693ad244a2974c40c0ba
SHA512da55497f13572e6735a9c2a6bde63aaad1c329a69b8627ff0495c9417c134cbc29ba43eecd60a06ec717dcdba1c26f489952df84b340b091bfc840be818500b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b55c3c83036738baaa75a1aa237117a
SHA1695afdffdf3bcb96dacc78f19af4e7aa12dd4f6a
SHA256697c029102dc0fab811ab843f77cd3e63e88c0de6de6690374e92cbd8531832d
SHA512bd71981457de55ae9b86eb061bec7f43155104fe9492c3ebd845b57db12abedcdda2b889a2c143821abca8f73e4cf53ddea9f522140b4f0fcc508d0091842bbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f71212d1150c08672fc7b8822f062f48
SHA1ac6579b416e8018416fe5f5307fb857f07d5ac9b
SHA2569a035833b2d24cd17627b8a1f631f72491af8f4bd6bc43f6815705c52aaec77a
SHA512bf09c53d40cdc11f0fa9a28ae123353d5144a98206e7c372c376a8564865ff22f51b303d206ccaeeacd4227bc980369f9c10cfcbc7eaf5fc86ff56a1b037883a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffb5d90d5b2c8a5ceaec60c42aea71d0
SHA1fb2f4f31a20677524207ebc6b826221d63fb64be
SHA2567bbf17af39935dd099a7734d63b4581e839fa071b34b29da314268be96574b6a
SHA51239cbba71241c301967e75dbef008a70e4be1c3c178b6a40d4dc68f5ea7f676559107e1b335482ad924f250ec366e90398488d61e58605c4424a8b7aa44cb9929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5e9dfa4af7023444e960971e19b9247
SHA1b32ad5de9f492f9137aaaa3bca37c8bfba802571
SHA256bb451e7ebc3902ca021187fb6103279dd117e59b62263851ea2081cd8dfa6096
SHA51234e5ec77a778b5345f0a70bb4005711a630ef6d56cc8b9294fb62ea2c3c7830f11001a5ce6ac54474478b8b6326826083f73051045b499ecabdeee34dc595316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b5d182b213dd0db03cc5e325e0fc54d
SHA152c536219a5504b95ec13c0326853f259cefdef7
SHA2568ff4dc5069d44c40c3749dac594c04901b350d8c82dfb3c5c68c3e4cc6bd7ea4
SHA51229ec9a15023d9233557500415a7f70989e535adfb99ff13fd99de8b43d0d0c2f5f70a00fbee34196f9e7d990e310902733e7db3cb6f7120c3c9cf14e28db9993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575e7885f4458c3c61ec0a2394c72e81c
SHA1217aa20e77b4b71a37b3031f856dfa8cab0624e4
SHA256a3ab8e0f3667e0a4bdd992959e886da12b7e5c62ec69c0f6c250c318ff4a5400
SHA512db2c7afb3324e9fbcdd92630045453cbae79bce038b0822380f95c469f118e44f7f25f32bc0d0b41bfcbb497c5f31386bf37ede1c4303f59471076191452cdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f029660ccabac7a50c385015e114319
SHA160de33fd2cd7b22f47ad1a4c248d4678545e9612
SHA25674f8b0cf554ea182ecef3f7508795cf5fe9c1996b2e3ecf37ea7b423445bdde3
SHA5121c2e62d221d7b496dc5d5dd6257d9333e8bd692bb098e37d8dccbc467b42d0fe43fe231872a709960ba3b23ec818e0d83219e610070ce09eedb13724cbc3f0fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5009ff0c343bad8b2c4ba1cbb7c2ad2dc
SHA13ec8e316811c033453513b8d876ae863424a34b9
SHA256db569b09fcf811c871d5d789124bde98e435a2f1b7f5db1258c78f8bc48c43cd
SHA512aebb6766ccd9e30c977ff33235ecbf6fdcac219b36ec3cda9ea3e08aed175f1f1dff658f263d85f81fa024a188f6df5146db9d480b61369356b22c2c58cfe7f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598d2f507e6a76a29101512b0130fe8a6
SHA1b6cf6873063c160cc40ceea3ceebca1675efe675
SHA256258969a7d1ad8e652b9462e81c8150a9c9242f6a673d204ce74b61f806c9d91e
SHA512f1a2e714e30eb011696d8a90327943f45ed4016c6c13e88fdbff8aa3fbc92cb02c6e711ba67e8c51f17bcd2f4dd3e572a979a099c8f5841bab8073f44aeea2b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5016dd7e23b31f4aac5dcca112a348469
SHA10c21b84c85660a684ace0b78e64fbd943e956317
SHA256a37cedfb6050facad603bad9dd1986a8d4e5a1e66e49e4431bdab9a422a59414
SHA5129d79a548b0a219e20506becaae528138edd835a51849e756d552466166f749fed59ea9bafc6f747782e5743465797d162bf6a3267ef4c6d2170f49bde482a832
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b