Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 12:54
Static task
static1
Behavioral task
behavioral1
Sample
bbcfd966c98f258c3d2da98d45619bca_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bbcfd966c98f258c3d2da98d45619bca_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bbcfd966c98f258c3d2da98d45619bca_JaffaCakes118.html
-
Size
5KB
-
MD5
bbcfd966c98f258c3d2da98d45619bca
-
SHA1
2f66051e9cd8e9ec8ff093987710c64c866c4267
-
SHA256
69bce012a38b2dfeb900d680f2d1be3aff888413798634287e5fa9764aaa453b
-
SHA512
fb5cdc0b9dd2ec03427d961a967bf208334852ab1067b20ddd0f8019ed435be9c9ce0da48ee66358d5abfade49d45cd7d3b7d7493e5d07ae62ce69a8d7465ca1
-
SSDEEP
96:zgl62KxauKhcaBgPE8PRIFtt6Uk8d5CJMkorHSTXcDTZ1HZDEtze6gEucvgurYhH:zgljcRIvt6QDrHSbcDTVSQ9FnfNgQygP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00acedab5bf5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000004791e0a075649e6f499d91feac3fe5f920719a961b38ede375d56314114d152d000000000e8000000002000020000000e90a50a992f71d7f8bd475dbdf1103dbb83e5234da97e803253d4ef32a29d8a6200000007b404e945e88f8d93b28c9159ce23cbece2c58a1c1ff163c16a4d3b63e2ff0e840000000dc2bc3c06e33589744c29c92d47ce2006435598defa15600c6ed5104f929fc2f553a0ea4964a38b0b1fef9097a6072ee985f51e2d50989ac653592a9bb06f99d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430579539" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D78016F1-614E-11EF-AAA3-7AF2B84EB3D8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000005e11024683c12c57a72c354ec1c6be6ec2a560bec0d04205a2a16955d01b725f000000000e800000000200002000000025b53ab6e47cdeb8ba192fdc13569d919ad38ec8d8415bae06fc6e4cf80772619000000063838add1b7902c4940cc7e043d59518d9219e5de0cbaeaafb480873d0a1392f5da64a33a92add31163608699783de68da39c0713856aae440c73456f0421a46bf04d41f7d99142cffcb75e30736f6d415c55f11725769f679fdc2dff2a0acb698fe8c1fd6fef0c8f5997569bf27ec6b2678ffaaaf7b5b603654814f1cd287d4008c94c1e169ffc55cc0a24baf2eaec540000000e026728442de653362d6b12f7548571775b81613aba380547664dbb1c57e48f5ec653dec95cb2cc6012d611003c9e48229d31563ff2a5a3bf40cf08f60b0cb45 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2508 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2508 iexplore.exe 2508 iexplore.exe 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2676 2508 iexplore.exe 30 PID 2508 wrote to memory of 2676 2508 iexplore.exe 30 PID 2508 wrote to memory of 2676 2508 iexplore.exe 30 PID 2508 wrote to memory of 2676 2508 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bbcfd966c98f258c3d2da98d45619bca_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2508 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a103a445b9a383e7c3fe4e23f4c94e23
SHA1981bbd5e8e1c6be0c8bd562c2faca079efea5051
SHA25613e247cfdddd0ed7f7382fa4b40abb63401148aaeee83f51048937a537c39311
SHA5128e081fef4116bf36e133f83c00cd207be1126af164490f701152ce0999239060ea4a6b3a822ac8ade0403cd7c4bee403d4457257f9da7c70c9c162444447ab11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1532011026a46d61d935efa5392875c
SHA165ca254ee29700597eaadde51d540671f16bb555
SHA256e4a56ad209faafe4467bf0bc99403870e825b0ca5d61deddfc05331281d37336
SHA512e807215a7af90bee32cf4e64c1786609d5ddcacbeb1f672f7296da14e2f358a378c6fa8c539678b25c9948712a0c57a720ab1ec367ef97e3b6949344a0762f7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53670c6442c02121f8cfcbdc55fb6b3d9
SHA1264d035a8cada4b28218f3fc7f32ca9c24208346
SHA256536e9f57b2bfe509965c586b70903e80b6a87956bd68701bd7b82ae64efb99f9
SHA512e08b5ea212b32507595d571b200893ad2392b19576f40c019174eb2f8908fa5a7dbbabccf16ff0d4bcbb8d491e8957983c71f128bcdb72ee8ba4171e43082ac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a18fa5cff587ec06e86c8fe8a8fc149
SHA1941747f2c64296c33fac989b0c55a8cbd794e832
SHA2567caae6318ae5cf3d377a7aee6ffb03a94c66d1202f857fe12401386e551d8f1e
SHA512505d18ace97e5e5a07d2ba13635827005a2354278be4dbbc883b62d565ac0297e21aef89da94405710d7af82e773823f8cf11bf34295e5a3ac5ee2927adb7cec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562813133a0c3ba77f65ee3058e428cb5
SHA101edf73f74be83a2e89efef4c31a5adda630a4ac
SHA256268a943da2eb596059d9226214ecd30c853591d521d4be0186aac8717b36dff2
SHA5125312b103d68abfbf319261543d564ffc3f973005d43157bf4fb733c4ace6ac2395265987ecc8f42d543641970df720a008bf18a708ecc10d92db558865461d45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5585e676b321836672d0ac51082c19da6
SHA1fe2d8ac84ce8d2354ed37e8ec622cff0d1e8d6c2
SHA256798b26401329c5330c7f9dba29f10c08bc3d1ddf3124979f7901a4b0ff7a8362
SHA512a29eb0787f05ad823190bac0ab537c6268b952b38064707d0762ecf361c0678f66241784a91b3eccd20042181183393aa7c16d15f575306ec7bbc20238cf764c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee6e267404a4cda196c91b2377d92a53
SHA1c36213b27a6f77ec9ad0ef61bfa0a4cb21525b30
SHA256b23a179b71de96b75ed1cd8a8770546ea1a20674c5de95665dbd684f184e7fd1
SHA5125389cee26c254c7d0b44e0b365da3d54de348744cd2ad4af7c9d113c1578c2a9e7ffeb1832cb160087cf716ffdf545bc608574324966f923a88149de572c50df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5254e5b6acc8a8c626eea1e276cf11d97
SHA12b93a34276e47820f8a628fa41ae1eece256eeb5
SHA256f61deb2c3f1aa4f83ea993eccb842ba34d0fc6887cbcdbca366058638622aeb6
SHA5120ca5d25f8c447f90b99c371adf18b7da9b1ac5e41f01b57f79f659fa902c8f7b1f6392f293d49c87e574abbc78d084576b3b9d93c0dd8b095494ef12d7d5affa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561677012326fedabb9104229525232c5
SHA16a9262dc6fcf3aaf0813beaf34d81fcc3329a92a
SHA2567d0b65e461ba927e6b7949dd5dc41620dece1c1f37a4d99e3446300787d52e8f
SHA5120940762ed15107ea0b78e0beb0c35b4ad0e4a87030b99259567f1df8417011086c6212e5e856a01bfc2424a75f4ca4e59cb822b358a7c007be5dabef2520f27b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb4e07d9f0ad0b8b3311a8e0d61c3468
SHA110d9720cc941266e3e1d7217e28689de7e8fd461
SHA256818385dc9578f7f71f9948894b0dc5d686fd4ec1950f631521d45b45c56a54d9
SHA512c28fdbedff162e6126550713fe81aa6b2463f5aa542e1cb3b43ca51d6b25ff64f70c6e228265eb76573cb16ccb4e58b81f06bc9e3c6febcf5b1d2b1049be2be7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5e88ec4df257fe87b4cb23939006b7d
SHA18614d7e66fbeab858c70530e67bb88b08e21de30
SHA25602f3ba758608f470187b9b100b8471f353553b9722f8a6ca906fff817863add9
SHA512ecf957d52b4f7c0edf707675044b058b577843496f74ae52bdfe0b013bbba4ffc6b37733c846c9ca332730decc663179b4a8d9ba245cca046ce5cc0e31b50539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532a8110bc9b4f62fc3183490a6ee2574
SHA14493f6533a563f1917008c8fdf0344a4c3968c10
SHA2561bcaab45b12ff8f4fe7cf7133f1898001fedecc564e10a6863aaa524d1d36ed4
SHA512cda30dd785f2cd9fe8f481c8c996e92943ead9f3b09de7eace996ffff1740cad8eca1f03fec67de5a8ced0c8643a01e0fb8cad506712c7784ee0a1a552a9164d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e862ce47229c60952cf75c6a1b96fa4
SHA1c19741fb6274ead16ea18a8ee95ece66e47b45e9
SHA256fec865cc081a947222965947a758056e334f7689533ad97a7ce8073f5fd508dc
SHA5125f94c01c7f9cf13f7527391c9ada4db8c1e0c19ab88cec5f06d26306f839716607a3349bd957cb1ecaba72987ac6f51135d35129b68a94671e15937530ecdedd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a04f1ac1e0bf9a18fe92a55eb81f83da
SHA12be0356b08beda4eace55641f597dc82a3c40dd0
SHA2569a23d7e46450dd6ca5c3f28f3167e420e3e36e8b723ea818d5d68cb152cb70a0
SHA512258ddf2cc352a2deaf4e8d3f9ff094a6dc7a9413e66a9c6e617f253d3a57528c2c2915121ccada41755b1d69406a9cf1865d2dfce9eae7a90bd9a7cc9c97287c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a46238034a1f080721126f8be2ae5473
SHA13ed86a7231fc68c4c0da7c60c25444e1e2ad9db8
SHA256a3ad0f5922617c71e81e558f261692e3c5a404a9ef742443a3a81750c0b8cc35
SHA512db2c89e4af34ed14be1bf36d8083a1665dd2d033662f2f61a6bc09f49057466ee68108263fa827060b57fa8107d197b993c082680d2636ab19a7acfa183fcb61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d5fb3744f6166375b30df2fb7231ed8
SHA1c9f761656082ef44b3b0574769f096ed1b7875bd
SHA256f6c7c67621ce69e7713623a477e739fb632f85bd08aae913da9b0a58ba8fecb1
SHA5128fa202d85c355bd0765c07346ee56ea0a00654ec8e5aeb40bc53a4aa5b579e8c94b11ed723160dd2519c45c21629309c53c0b895c6b9db12e24d4f73b7186bf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5623f988d553a8a5df64c3ab2e5dc1643
SHA1e0099f9b656eeb66d5d48a6981231acb5736a0ca
SHA2563590f82950db12bd3630c6084cbc8d0e1637b17c9219203ff9f225b8c27e889e
SHA51211047bbafa3b413423f5221ce5bb98e67f011821b73e2ae34dfb107c6a4f03350bfca57096272de92c3fba331dae5e8e366ac3bc1fd35321b9109e3ae0705c16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54df90a03bfbc37ed92c8a07e0129cfa4
SHA1b052a6d8f622fbdc9c3fbee1c014688aa920715d
SHA256b3d3b4c7355f87d763b5e8d9752a8b93c7bd6fc908d2579499d86d31269c12bd
SHA512fdff931fe7d7ff1f6224f6d512d3237ee2ade8ce8a958b242948b8b5292a00dd27c9ca8ad57aa845ef5d18e152bea3bf864443d7f27a9180da734d148b573c21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52922bc7c8b9ca9c3975f2e95e204d801
SHA19f4ab607995ac24b2f1dca28dcc2f80405756334
SHA256af442f2bc3a00c51ff85d3b1daba3c84188aa3d536ffe9bb301467c3b1e4efaa
SHA5129ac466a9e5f5c06cc71e9ad41280a48b4176b7ba60708c99aab071af3e397a5dd09c51cc8bbed1e7f15619d679b46b109ad9fffdbddce70fe6185e76cc5b8090
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b