Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
0c9b783a0458f66ef3f0451da6028f4b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0c9b783a0458f66ef3f0451da6028f4b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0c9b783a0458f66ef3f0451da6028f4b_JaffaCakes118.html
-
Size
139KB
-
MD5
0c9b783a0458f66ef3f0451da6028f4b
-
SHA1
ed755bc4a05e038bcf23fb71e5a065dece9a05af
-
SHA256
26f2ef43648523af290fb26d59d89914e1686e530517b354fbf92a7cf9630bb1
-
SHA512
54c371db10941b7a1ab0c191e7c591dcd088380e58af189cb083ab1b74ffbeb3b25b7e2d51f24062b638b211b405be0320c10dc26f8b21ce02ddedcacc687762
-
SSDEEP
1536:S7Ri0FrIJlQryLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:S7fHyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FA6B1D21-8108-11EF-AA6E-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 801d20121615db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434067971" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000d077af85ee6784a61eb74915dab314c0bef2009467e018b576d81357389f7b7d000000000e8000000002000020000000ffb6cb8c05b07615d8fa90e815a5301dc2ca21eddb8a8cbabf02a4a7b7b2da29200000008e81c48a1963452b090217855725f5c9845c5859580635452e7281795c0f748940000000b27cacbc7d151b32c69c76c9afe68ff298f3c3c382916a359d5e9381a92565265d496d40f4a5da1cf4ecbea8e18d694f5e6a34329ded69dad6f36764a2f1457a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3044 iexplore.exe 3044 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2380 3044 iexplore.exe 31 PID 3044 wrote to memory of 2380 3044 iexplore.exe 31 PID 3044 wrote to memory of 2380 3044 iexplore.exe 31 PID 3044 wrote to memory of 2380 3044 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0c9b783a0458f66ef3f0451da6028f4b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b845232cf0e013738f1d2f0e102b8424
SHA13439291bbf227be2df75fb2acd2d1f7e368efa1a
SHA2568e083a4884c683f5651e8a26fa901043a97ecda85867d060b8ff3dad204f1255
SHA512278ceaa5bc6e639324cbda0957c78768c1ce409052b196678dbcbf712c66a1ca69adeb1d02978cef1cbf847fd6b456b85a3c37c8b4a929d0f0d0c9d8cebaa57e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5a7a67ce35f4c756745af0bba435482
SHA14e18239a7bd133b0e8a539d20d7a819049d9bf87
SHA256d4960272aff117fb33b718a4e6c75aaa030350751801623019ad8a2276d59750
SHA512825fb360f89b9e91c0a604eeda38a516c0066b372194486d826705d1285f0b3f3c9b2b6efa27bcd04607a2d3c62e1bc6371e25f1883ba92435a8ac0a92fd635b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c414e3e96549fda1b053946821b0bf02
SHA1e92917cc5ae1b6afb7e3d41f5e15a3627dece0e5
SHA25662702637757b50be2b97eed3a59e6c60986b8d76add9ca91a9e7925d94d48ee8
SHA5125c18ebd14c01d7855e0ac8d1f2dace43212b15d986bbcadac48e7e89f0b806deddd22c52bb058ef8b266249c9fb16754ccedf1ee7194da890b52c7e992b9fd70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569e7579e1c78bca0f3a3004381eeb6a9
SHA1bfddb212980370bb5924a43ddf675f004ebc7d4c
SHA2569f8e0389f1312db56ee04bbda8f6456e3cb946f0d0e0dd5c22d792245b13c058
SHA512043ccd5e9661d54aff632f1856dc9f19544ca629d74283a3c90009aebfab0ade8cfecceb4859fbfc0e27483bc27dea9d41373e1c5d53902a7b6d01c66b2f11ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f35525f20cbdf6c1db282b801027808d
SHA1471af428996deed84e9433a0ebad54d78aed5140
SHA256b9ed29ad59e91bffea6835766832e5293dc7609800443c89bb43e5b058d7d4a6
SHA5129511c06a251db1cbaf240559f52161284656121cc218a3624b99d9754c5e2a43259cd273bd5b21abeebeb6d5ce9d1de5822e3432d5cce1ebf2fe974fa98979fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0c9f04820b48bcaacbdcdc651e69f95
SHA1df19debbcbfa2e1d0ede9bc83f61639bcf096692
SHA25651df1d51a7e562865ccd20a899e42dc8d4be6be7616ba6232b7d2e69ade60d85
SHA51264fdd9b88e4b5b35335dc37af642fce2e704aca3b1eb4fadbccdf7a72c611dc592cf0ec9cfe06a212cf3ab69d47c5abadba1cde846cfc1779bbac7773cf50f77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba3c9e4ff66d3e1e15a66dcba3b99dd3
SHA1296e660adb3c22549035be1e8b8b6ff969aa1e9f
SHA256c183afdc77c9aaa87a0dd191bdac824eb35592ebd6165f75f681558558926dc9
SHA512868477c963a90ca3a2239f2c3904bbea2d173ebb8a5fcac315c28748522336d02532c2e023f06a605a094533fc2e09d4d5b21a656d2c2ced181a7f875bbb3ef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555b07eab454b1cbded982c07a3d63fad
SHA1843e786ea22da0d5785bd1c1aeac4be30886d3f8
SHA256e6ad352043aee10f65498d58bbc809657fed18bc918dbf8093b9bf1b5d390a0c
SHA51266408387f9c8b6af61713ac0c167a61275a81f8d418d3eb05c8cda17ca7dd931b188dc3a40d4169005ae6b6d6921a33d01d129591803365e09bd40b3629f17a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568e2c9b877d571110c8b581ee88528ab
SHA181f9db21d738d82d9e466f4c18bb0ae1af7aef7e
SHA256c19c7c7a53805017349164579e653a01cd45511d4f4d3f95374edb35b2679a7e
SHA5126f63134195a61cd67c258504ac3267da6ce6d78fda203556d97db2a1a44ff3c634e00ee0dc4d3f80d6c000d8c17d0dbbaf74dece776ddda662c6b8b89c7aa365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a8dcbf63ffc3e6a24cf10630c5ff3bb
SHA140dd8f4e6b4d2ce149e8c4a7dc8757264ef32ab5
SHA25668b6c19985caf0759a9e0ec0b45a916f2c4a344cd144550ca677573fd5aeafcf
SHA512ff4d71ed6c4dacb702e478a92c82c9baf22ca159368960e9d7922b720ddd26f93fc2b7d98c2b25bf8221952fcd22c7d7337e8a463c85f726360e9b95b010fb50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9f912be4841912c187466d7e2c80608
SHA18ca6fa7fa56f370e4da9f099eb380c8b55929268
SHA2562175cd41758f7d06131c943b7145e08bd68b8c9b2c7c4a015b0a2f6d6235e9ff
SHA51230fc60c7802db68b25e46fc37b357a31bffe51ac2a3d3abe80d70998fa3f79a5b2e534314f1ac2149577d1ccc3cc685c4c4489794ce6c2ab1aa1e0ac0104361d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f52db6ba584ca41b01f575081265581
SHA1a8b2a1a1a777a134e5dd01b7e44f68b264663b59
SHA256721f2d641ba74b1bd4ebebd51d10addbd1d57a2ff3c5deb545af54feaa7f8662
SHA51206a99707c0105538a93c00d22b3cf0411e4ab438b4943d9147065e7566ff03aea63687a2ec964db2b71c744e6afc336127d584dc0fb07184948addfd4981a4aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561160f34dc2de65305a7789b2a09b23a
SHA1c4e087e6b154ed1062d837c5c2fe442c03893366
SHA2565b8f1cbcd4777c8bcf955458217aec134ea51c8433f33273dad3ce874d83debd
SHA5122450c8ec5f4d5bf3c5a9109c40c04a9b4df6def09adc2ad6184399dcb30ff2991f65f70291cc00a21680ca102660e59a71fb50418c4102cc0ef70468aa7d596d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaea723e0a174c91751ab223c789404d
SHA12062b729dc8681ffb6a75a2a193c7441740f185a
SHA2562c7b6a214fa6ea3e034c02043eadb49cb4af84b70a3e0fffc8ee2506edd5a7f0
SHA512cdcdbc2cdae879ea7ce9e8c12a305b05cd5ec63d816af06d4fee32ef9b0a9864e690d381b90cd9b7334c0650f7b9e545d8b48c17662cc7f072adf1962fc06c4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f43d56d1aa6481d656db22685a9b1c72
SHA17a5f975eb5d6cf4143ec64a87ffe21ff5d6b7e1e
SHA256d6ba78c84c701e3ca30528f2534be3021a3c61df6183b2fca8ecfbd648aef0c8
SHA51220aeb110052ff9ae7330cd20731076510aa25d717f938c00b34edc6fe8b7323bec8b53dbd23a405068946ff04a4be106e17dad6c9743c92ae6989dbae653e7dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531b76fc5a4ba1f1f6433830bf0a66e3f
SHA1b8abd9e38c4cf5aa2db3bbc8c097f65ba0f319f1
SHA25652ce07054601c10333af6bec40ddcbb3bbda942b8d4833948d4df5a8498cd79e
SHA5123c9c277b5f495af9c9477bfdb9ba4e068632ce48f66f084f14bc3a3d522e870ad32cccbd81fe9042b6f3058dc3fa369722f640172d0330b48300e1e0eef34a58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0e8092baf855d648440a823ff14b1db
SHA109f43f88f05328764bed4e44315139dbe4b16f9a
SHA25622b75a1d90ddb1603f01fc73858a75a4d865bfbb726d986f663106b1b6b6c2f1
SHA512cbacf3a362f0cf68e525961e7452a928718d7bfcc5c278a15ccfcdb85ab37d4cbb8db9523183357d3d4fc133723779a05cccdfe3c32624f742e21d919f72bcb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4e34f12ff3b5611df7dfa8e93488911
SHA1693b69c8a2977d66c9540ac8df378b5fdf6e15b7
SHA256749ad065e55acdc084f139e4ff6729f182ba86c46a36cdf078b98f3d4747777d
SHA512b5b1b63d618721103e1a64a0ddc885c2563143b69125032cca0549e4f54f45c8144a5cb2db16e7c78040d432d7efc27caf0c1d62f924e916fc17ce2415321b4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578d1b3f05315aacf8510bfaf45bd7e3d
SHA19f3e7cd6e0a0cd2356d93d300657ebf4469218aa
SHA256ddf54fdd0fd5fb7eb006d93bacd1e995fb27efae586b0f0bce3b5721b6673748
SHA512f6107ad3dad11beb0a06fa0a25dc6529a2e4e63810d87318af6d96cdbb51eb51b10724e9b73c833d60cfff5c144370a2463172ecef64537d1463a1c0d764db08
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b