Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 00:19
Static task
static1
Behavioral task
behavioral1
Sample
dd4f3308eda33de488bfcb2e334f614b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dd4f3308eda33de488bfcb2e334f614b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd4f3308eda33de488bfcb2e334f614b_JaffaCakes118.html
-
Size
217KB
-
MD5
dd4f3308eda33de488bfcb2e334f614b
-
SHA1
a3e764613ea59e6346ef0e1f42e0c710357782a8
-
SHA256
0f3465e46c3ae1f54af4f6ac18860f85218162d9f0c85e032613f4fd448f7c35
-
SHA512
cd96541f5912582dcaebf1e3cf82c6918e33e1522b6c2956cbd3c394f056c1c947f02e6e9c2d81a84d7da19d8ccd5e3f4e54066cb39fb347baa65b7d733573a9
-
SSDEEP
3072:SvtrTGhIHbyfkMY+BES09JXAnyrZalI+YQ:Svt/GhA+sMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000050764bcabb14747401126b0b8f8f349c70752e497a76d2ed72f0949253ee4031000000000e80000000020000200000005edaddfcfd442ee0e9c3e667e0f8d11bf0c80891b7249163dcfe495f50d29a1f20000000dc19db61e95967ec34b707e1d4248a7ec191b36cea09bbf2d81f07f516fca0c64000000076c923682c158e7ff5e00766a73ad98d8e6f33c3c873d4cb5dfaf81a74716b59695e75b3ff770a028bc369a44b15c1e81d221fef495ddf53bee28ade31660833 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c04b58fb7205db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E2405061-7165-11EF-8B76-DA2B18D38280} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432348655" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 744 iexplore.exe 744 iexplore.exe 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 744 wrote to memory of 2180 744 iexplore.exe 30 PID 744 wrote to memory of 2180 744 iexplore.exe 30 PID 744 wrote to memory of 2180 744 iexplore.exe 30 PID 744 wrote to memory of 2180 744 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd4f3308eda33de488bfcb2e334f614b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:744 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d48a131f02f6119c88bd14cf7d4ce980
SHA1ee5012b73872adc50dd0b343b136bf43c3d2e831
SHA256cce14fccb764771e5c042b73f98321c755db5db3b50bcc55ff461aea8a5560e6
SHA5122e9ef9c16f45d21a8c84f7a98c6b4a1830e12c632010eeadb06cff32190dfeff2276549241e2c9e66eade5d29130dc09dd1470a41ce922986a1c9f923054aad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c069735e8d2b9ebf41345cdf82b0aea5
SHA16162a4de1794292692bbc926d689ff5d5f5bb6ba
SHA2563e221daae11c86cfe5ed42f1107661ae5b4b7eb665c48af9eb2696217d4a0886
SHA51246d277bf106e1be8896c630405162ffd6453f7db846ad1bbcf1180728e3fbc3426fae27c33be366983e60e75fbc6746c310a7ff8de8389f495269f6b76aa656b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568fdbceb647de8b5a0bf9e66695243bc
SHA1b02c42fa73f6fbb180e8e97fced7855820ca5bb2
SHA256b46e38b16896787c44fc9ebc8b96a1cb88cce387cf0beae810c431ca0644a5a3
SHA512e2eb020b8cf690daad53b443bf8b6cdb5a48e63d2fb8b00af02bbc23388eee24e6135ed5e786082970e46a0f51a9318feaa54a363d58326dd33a006eb7de18a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549364a351ee157a533323543bf5f9365
SHA1cb40b138a37f3b7af661e6121d3ab3081897dc63
SHA256b8a76f2a7f214933fd3b9a953b5b997fb17a6dc3a21e47f7ad9c2fcbe5d21201
SHA5129865b29b32508174129515a9809a06f9cab42d1c0bcc90bbdfbd4fec791249d3c1a9dcda2f262e561419d6b66f300ed1d3e31d43980f66cb4ee6377933043d45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5934e9107eb1ab8ef604e14e9fcb4aa8d
SHA17efe3b60b1f912d703b2da52f268b5d0dee0b9f1
SHA256129b0f0d1fac3c4b144178bd98cab5da7e315122c4aa772e3f78311ab699eada
SHA51211f9a7e47e57560aed437e4811001d3da38c27f4ed53de31d0dca4207f21a47b50f055c95a007e263e021c4463f12a6d5acd23771df9c1a621cb136d56687cfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5def97596b223bc68d654355c8cbe791b
SHA11e78262d7046778f369a73bf4afaae07edd29135
SHA256c0631464547338979cfd0b9465e2972c07b04316fa87b9840856df0757a06fd0
SHA512dadf0dca9d60f52d37d663a422ab8c419c2a47df19b28cfaf6fc97636bb48f86cebaab57160b7c89c3747bc301ea9d787560ccae0a96c053d42137402fc63f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af2b5103ba1fed3d9e1b79b53605a0bc
SHA19e67b082534762d62e53cd31aafed7c2f0009e38
SHA2565588f77d2138890afad79ec59eb21174fe8fb6bb0ef9b782cb16c4448bd8b7bc
SHA5121ca02368cadbd49938b5abd69ae9bb1da0f83dbe8299d3ae91de5ca124df4f64138b669809ccc131b2eb921df67dfe2f7ab71ac3343c2505138b8963f29ba660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7691ce0a4ecc8b554c427aa253f9342
SHA1144d1c2802d528b51b7a4dc5b0599638b752f937
SHA25632b4913d1234136086dc458a22ec077cd93b786f77c6534814505e5b23da9df2
SHA512ea66f78f77a4bd9be3694dbc1fe3444203e9f29ccc6bc474ab92962514c9540f244893a3ecb2bb9fc7db46a93aeeb4b6eb5949e6b08e72e13fd531357cd0f4bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543b7b93c09b192ce8742758a344ad722
SHA17f85b922d71cfe1ec012dc96b500969077031577
SHA2561c381ab2ec8e99851efde2ac6aca0a45c3fc12fb476f45d96c2ae13d8168c166
SHA51240cf33bce8e4db11e79600819f78ae4e83259936c603ee3aebf320977c067bd83e1abe135f627ec9c35adb1bd3cef532a190ba3ff097ef075521415669dbe70b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3a6dd1fd512720f83ba4361c190f2c9
SHA16cf7095a2157ba2282c9383edad91d24c803eabb
SHA256b6b16efd2502ba07ef821a95ecb49552c7e8d03c8b6cd1931fdbb6153c0d3fba
SHA512db97f227aab493cf8fc07267f813baa01784049217d6016ef3b8f4acba100c39b2102062749d7dc0f6fed96a86f500bc07bb7f5bd9d24cd88c4c977c7e850e86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5832cc90467810b55b72c494fd3376205
SHA1e076c1016b62c3e39d1f3b8b0ee0de0297ebdf13
SHA2560179a54c0d6467a5747ffb85681764a318095a3e070f400d90c2acdaa6ca2058
SHA5127ad553647446319b39f9bca6083f31f324c76dc973d6a3eeddd51a546239f8babec1a22f5b5382d378cf700a2a1ba7b4d87ddee1a5d0d419d091bab78929c650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539af7d4b8249cf12cfbcbe3929b84fb4
SHA1896144896e160114435caf064cd4b01634f39df4
SHA256fb29b66c8d0cc9d7fe0ca1ec5a32fa29b78a19a499213514ce47ce664d1f2d5d
SHA5123430c2efa5decb4da81c516546dd1cfad3da9d7e62b89a504cd71a3194bdb4e7b1dfcf9616d906c3ef28987c585d8cc53b96416381be14fdea9f32e7107b5602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b20b634d49bd987ea3a35d73af87c76
SHA11a9457625e8f27acb150bb5a5862e9673a7d2ade
SHA256ce816b6fcb4a0b1b7017a056b6055a94f561b5b144f7d4672cb7b41aa8dc2cc8
SHA512724e9e1c53e1a6fac19dfd70fa5faac376720957146925eaf587612c43304fc40f21b4c51500fdad31f5294108f737c2de8bd9ca5b41b7b2e4e1ba3d03b8edb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8392706cb3b7b323bf9b147c8062d6b
SHA1b036038c9f5995195e411c45baafd3b46baf25b5
SHA25666ceadaecaf7e1043a278b31ca0ec5f1e166da1631bf765fa4325bb9bf2ba55b
SHA5123cd06ca57dfac44a7ecb630ad0210f433ae4788cffbafbe3efda75ac8b5e06717ee53b5b9197b667cd4e496b017376e48a1b167781c264174b1a4fb1a07ecbfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512f8e8c51c711cc84d7f061ee767b364
SHA14388c8aa285793dd9dc365f4c1a3ffa048c2d1f7
SHA256df7282da421cc2458153e0a220be2c241ce653d75bdea2eb7982b3c4b3387927
SHA51255cf212630b44957ece5124ac1ca48fe63f5d1a7f0b76f0ad677e787a152f35ffa76749d62a38ac6e52ad91a2784aa9e0a7891c9fc13eadc502d555c62158d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6c2948accb3a2f32da7d3f4a816c774
SHA1d1aeba8ba473a4073c699e3a508d42beb27d1284
SHA25645937c00cd2de1fe0493ce6fd3a21bbbdc96017505119c0f693661550b54176a
SHA5124761487ae7aa930101feb8f3e9e36ab22093214cb5473c02da23a7e54940a2734795087d919d2fb6f06ac544d10f276622fa1cc126eb2e23f8a9602bdade34a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537a6e1be715af08cd6d4dbb401ffdd63
SHA1f4ace47c2b4928fed24b7a40603702d830c87571
SHA256089ff64617938f7cd8f08e503ea9f35658c55ec859dcce2e8be59e888565ba09
SHA51298188c966a68d3dbbf555c9c52dc7cffd27388c74e9f40a88c156665c4a0535cf840872c9b6648b9dc9e33038b3140c48422084e6289a0583d9e14b2b3e0c280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558a629b5b277217e15dd6b95632203d2
SHA1ca4272de3441b7ef17346ed4e4b5835afdd8a060
SHA25694cf14e9a34c0d7ce4bc4192265b466fd0a4a5ac05a3a9d96c5cff47f281cab3
SHA512364086a22516148486163c3a3fb486b1eef2f17948ecba6a13290580d083d29b6ec9de74bf0bc0c41cdbb86db10a9e7db3c9e34b577d12606c485f8dbb5d472c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f14f54aa60e947a6fadd449899386c2
SHA1b1feb773734ac574200e8bb932779b804eb1f492
SHA256842c4f5729009e5b0ab0c06c0d99b942ff473e02e58097fdd5f70192d35edc2c
SHA512455678a59f0327869a35e84e8f697f347d3b1d3df9f664c2125cffae937334e6978d1ce5c5c5fea4f8d4209bc94e2104d6e4d34e98904c826dfdf9d1a2057267
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b