Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
f68bc8f60f21d6b27c75b10ddec0f26c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f68bc8f60f21d6b27c75b10ddec0f26c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f68bc8f60f21d6b27c75b10ddec0f26c_JaffaCakes118.html
-
Size
460KB
-
MD5
f68bc8f60f21d6b27c75b10ddec0f26c
-
SHA1
9ed8f251da4587c35b05a9647e5285e722e94542
-
SHA256
0935a70360c020a96447416c9c47a60e1136ac3454941de03927ba555438862b
-
SHA512
4c8041064c5eaa612e9b3fcaf209605aa51c75c966b1e47e6feec9563ca8014ab02dbfe61f0a3da1165d6b4b683a8a45269c3b42b9641877d1574c0e1c9d4448
-
SSDEEP
6144:STsMYod+X3oI+YmQysMYod+X3oI+YvsMYod+X3oI+YLsMYod+X3oI+YQ:W5d+X3w5d+X315d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ECDECDC1-7B66-11EF-BBB7-C6DA928D33CD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0cff4c6730fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433448613" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000009745b131d8b213167150e8df8785ecb33656dbae8fccef925781c71632b7624d000000000e8000000002000020000000e8dd1ec3f349686ed5cc94c8ccc627a816f4bce74a99fe4cc1a3c78c9044e01c9000000045bfe5dfe7e4cc1b2bc2ff7578f7076167286382881b7db00f8b3ebe695d7a66553f1b7da564571bbde7f175445caec47965c5f9e18385a2642f5cd62b57338ccd96bbdf79e5c9eadceda57fa12051a3dec8e3099cb1f6f06454221109af7df12b19314ce811d32cc32700c724a82b9c587e94ae92b6ec6a0cbbfbc038d8c688d75a64247c3c0a93dc3ae036c480407540000000337eeba616b9c1e5201f7c8bf43659cf64bb164572d49ae968060dee2031b62e4cd9bee1b2e0dbd828eadfa65d83ec8f1d9dd8e6ba82fb011a5a8a8905e32ae6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000f78d3aab28935d62210db88b2155ecae50e62b914307afac672afa565d693dbe000000000e8000000002000020000000127a1420bd8365091a802388124e83e043f33d9691bfeca9e259355fd7fb899f2000000055a9393f98b1a49911ec1bdac04a2532a1d1d26b663defa678b0c8ba28b94de340000000b58c8b6cb6208113f4b339e21cb8c7a8b60394ea3af9418449277909fe21aad87c83bb35353b77c6444cd88e575fab8fc2805aabddf70fe2cbf6a4a63ace4f45 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 276 iexplore.exe 276 iexplore.exe 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 276 wrote to memory of 1704 276 iexplore.exe 31 PID 276 wrote to memory of 1704 276 iexplore.exe 31 PID 276 wrote to memory of 1704 276 iexplore.exe 31 PID 276 wrote to memory of 1704 276 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f68bc8f60f21d6b27c75b10ddec0f26c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:276 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515a302bf6920074709955a7fbdb91b6c
SHA1bcd79394d83d123a8cadd0bfc1f3b1e2952fffff
SHA256b62c6b99b6af8118cc99efac85bb7507e7c0d7a1d0916cc48deadea34a9492cf
SHA512f80eb34e270d6c0ea14053fe07afbf6f3b2eafbe79fcde6199e25d7bdda7a14e8683133e3b93113f53bb9035b7447576fadda55b42570fba671c94b66e01d0dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd2577b158d217e0343b181aa5c91a2b
SHA1a1b7d087fdf594ecca81773f72e5d7720eb9fc10
SHA2562cbcdc2db7f504ce197f89d74a38788d5540083cb07549ecc6e726552c913313
SHA512b49ea7a125c9f03a72ed284543ee9b38835c5962a72e4aba545fe140aeadd7cdb767ce688af9f671626b528caec437b339ebe0ad4f4e14d11bbc947aea501691
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eefec7b805881879a668fab4678a303c
SHA1af768fb9e9759c90e11f7112003cbfd71c00e6ad
SHA2565fdada8f4748504a192c67518c1e21918b9f151ad3ed9f4ff89637197e9ab93f
SHA512bdec8cbb31681dff26ac1bea9b5bd3b124b5ed58ac9eecfac232d885ea71d9443d693e8f449b4b538291a37a21bf8a7271ad0dcd53f8bbd37fee90a73fdf1fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f97bac3b1d29b10cdca550a5657ae37
SHA1e29c5f82ef12c70ddecb5dc8bb57a843a634ab26
SHA25601fcb2e4f27daa240b5d2b4421f1dd23091bc66c2e631999713de53aabce1018
SHA512b2d3bc9d77e3e760e0364f900c04882d13ea7fcf7b5373b52c7f9db5fbeec76c009a183037b1e900a54a591757a3e3c22c840ebcf47a247992ca073347c49293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58446a4f1d31bf0ef1ee17b06d22c0ad2
SHA1f3f0493edb0ff098f106b0987e8ac92ab489b65e
SHA256878a29a2e32080ab199fcadf2f64f0f5d476c8edcd32cef83bcf12c4d3b27834
SHA5122c43406b1932492d8ad6b5173ac2a658ac5e9f8841b788adaab42d4766a7781ad0593226f894c6e1c3430f732a69fda55ee19d9c3319aebb2dd04e39e8df27a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cf0afc7e41d07e42d4bf35e957c5e14
SHA1ffde16e2e6eba443e8326fbb04305ff769128065
SHA256a96a23a8ca76291668638097fac3ba03d30a64c604715420b51e7070b918192f
SHA512753398288762d6ab7b04aa2ff4e0410f47a581af2d83dd60f29868c0f32d05194a6405ce04ec7fad83506286fff495e8e6aacaac13b87d6f50556eb88c77054c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4839e4a41274aae0813a897f59c1dbb
SHA182e9e67cd2bca99b73a32b3a21b5338e963e3820
SHA25690677896e17408bea1714a430dc859940982502214dd66e870a3d5fc8737ff6f
SHA512c52aa5a3fce1cdc40bdf170ffaa0048b96b0a4c7ceee2683f39f6ca2e5fa3c0e576b8117ab7170ed21b5b2bac855368b35ec4ea5a3ac871fe7d8895741627731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a15cab4040fd722e4c22a2c04d923bad
SHA10c2540c4d65653a999deed76e38874f3fd2da340
SHA2562cebf6d8643a9d1feb42f288636b202abc0a783bd6a2d1b0621e7297448c7723
SHA512c9e77951d7a20239481160fd4b24af00fa304c7fe748c4abe1a6218002ea776b4c386bd5a5c381b999b5a4c9fdc31fec6a03422e96bfa2b77c927b704ddd804e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d58139ee7161ab374f4aae281ba2f671
SHA1ac6d7e0b26a9b885598a32ba8e98938f75603385
SHA2560670a85f3a1f3dec5eec6aa115f2289d719ca9fa045c4a48c8882b14f6d1c6c0
SHA51290dae538869f9043642d809102f7c80203b65f549502d60f6e3056f89d3ca49840ec8eb721ddb7564cb3dc5d587bf8c7c594a8e75dd0703f25bba84344c10834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d5f23645fb0cd0d863d081765e57543
SHA1da8a14ee1be1ac6462d21de8cf394ee97971b53f
SHA25614432856bd9a53872bab4989867b7394b4763d771d1101211411c704e86e9c9c
SHA5120288c051c0b97512029d36d0836e1fa62c80fb45542a5a05d512a7ee7fcb3f6d8f65b3ddec3acc17dd4e753c556233d7d91a6d6a6b4ecb3fdfd6b8165c686333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bda713fb1908eabbf6f53bd2cd6189d
SHA1eba002ea880cecba52eca8ebd763425dc459c621
SHA256dcbc7c365ccfb4c43589cd1fad1deba91ef002c88598c2b6ab97230d8b030f84
SHA5126d55def9f60ff4789e1f22138c3873bfe92b769d6cbe9b785e17b7c9cbb4b410c6facc621909335696d1f6c5efa3e8b6b6860c8c9e53416363c8246260a24512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a98f2b43b4fcf2acb738e2aa2d7e7af
SHA16475f942054d6976f03e149c6a7760b8a6686bdd
SHA2560c0e9d6e2d2429f36326211159517fcd09aaaaebf9e20f0f3388182b0e2ff7ff
SHA512ccffafeef692f259be909859514cf6a7ffcc50136278c8ca3a08f92c25d1b574903834caff68bd745ae3083f90227a132d5ed170beff85b92ccfadf9c64dab37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5407c95d535fbe3028c09e9fab83d455c
SHA184d6af3b244bb2a9cc75258c7effd5b25741f7a6
SHA2565eaed9220f925605d7f6155b6a31cdc5a766f8b47627acd7f8daed444098865c
SHA512eb93a4d5a209ee359f8d102c0d0e980cdad3c5c889ed0444bc2d00d5027c27c3b8e54fe61a814cdb10f54052962f7cd231965c622f82c1522174e52d0d01dc73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f6ee6124497c3db6442f19dde120830
SHA1a973f98ae4067897553bca676ca49649d830f206
SHA25644e5bf7216b3b8a50cd3f64d5413891f870e08c06b5b6f7f57c4c893f094e136
SHA51277d631e94c7b02556a7849d55c2b6aaff034f89d5c7c570549ef4e62ef4edb816a65577a6a3899d472fa4a246f3aa749534c42d60460b097c62dd9ddcf6a2015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3895c991d40421cfc700abf243948bd
SHA15735d3bd2d3ae83baee0f15a969ebd3a22469e1f
SHA2568517843104f09cf32be69f13b8c84b4373f18bf01911c4d41a8554f313be067e
SHA512189b1817dad4e46656841ebdb63710c59d8f01acf51bfc1d747254f5af26fff893af386bce810a50aea3f1c20712085cadecd077254274fd93d1a1355f3768a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b19ec94f3ecb61a2a0a86af264619155
SHA1f7a80c4bacfa6f1ebbef679adf653d5d54253950
SHA256c65ad02b539bc50708ac98df6b789876d7c80b9fa26d7af59e2850acc9b714f4
SHA512a11d9dd515bf93a82cc507ee36e68f3b0cdd9c4a4be3555fd39e9d95859f8843c783d4830c2982fa801ec37b72c52b4be6379e421a170f629d39e07c8ed76532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2907383bd042ff978c8f18ecbc5f807
SHA1df4fe5a063e5dbe78960c12311a1ed5fdcab47ed
SHA256a00481f8d10a652a4196149eb85c154afd86bafdd879dae8d0c08064b88e51ef
SHA512ddc8b6ccd4d17b0831cedf311fe06029bfebe8d9fdcfbf159f24e874a5a233053e48defb4f574f67c7da035897249bf5b20081554fccbb4237717d764892a268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514bd5a79b9e98863b4d09874a8aa0f5a
SHA1b911635312bda13b43bb4a887014764833beed55
SHA2564b31b0418993a91fc94b0a7770e6eafcc9d5555c0e9c62e807a18646a9b0e4a7
SHA5123860e121fe832b044bfe589d188768e793493ee772849bd041920f7b2c9f883556c382ab6db9a712846e37a4ab2b014230b4860cf3f322d654d71d3f25856c6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a4dcb92d8eef97083ece4091db071f5
SHA116457386e4e50cebd4144b8a107dd11f93d1c30a
SHA2562cd9457c7cd1910d0b691cb969f8d2e72a47d1f40e198294a61d8482f5fd8ed7
SHA5120fba4ac8026686f709eb766dc680a4284395a05271d06961a4537061a7279e58c3b4d8dd4afb41fb42d33eb7d6fb19742a5b60093ce3df6068dec0c29bf5953a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b