Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
f977e12b8ce27c591efab06f0ba8803e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f977e12b8ce27c591efab06f0ba8803e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f977e12b8ce27c591efab06f0ba8803e_JaffaCakes118.html
-
Size
4KB
-
MD5
f977e12b8ce27c591efab06f0ba8803e
-
SHA1
56dd8ffaba365f85ef495ad2c97d074ebabdff90
-
SHA256
9cc8cd926a9df17a232a3a5b61c9121bf80c6fa69a80616aa41e7aeb9904c83c
-
SHA512
a051d075136bb2e2512df7fd17a298c51da37b0945e208a3a9a572bdfc90e39836b54a0ac3217205a013a54d437ee1dbdfa0af440a2c3ba1a466a1a5c3ca743f
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o4dyd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8050898c7c10db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433562342" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B80D05D1-7C6F-11EF-9F30-7694D31B45CA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000004a696bd75413e7373968db57cdd4880195699e6ed353593c41c9fed2f8b4941d000000000e8000000002000020000000b21ab04b57c284474f6ada66a6c07358a3459b9b532b2c2fef2543417c96e04a200000005aa0939d6976ec3b8919f10b3ec118751f2bde3271bc35ed67fb7b9e22c1ca43400000001860c5465e632d5f529e166a4811a99f27c1ebec89ac454ac84ebe4e0846dc530b2942f1674ed3ddc0f0e81e92bf7b87fbb5460ae24283b730bd4a9a45385026 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000068d26755f2fcab48b6a8df10a8f2440d6aeb3eada66194cdcb5ffc0bc2bc7051000000000e8000000002000020000000c1feef7260240cea47c55f13c828c459b58fda1eb103df1d7c6fe58925ce1d5490000000f9d32ec5d96e7922d8fa75a3e32d0e9196f884033d936a425aa46de4e71c20190c16f0de1da2cbba3eba0cca753b46c379ca622581bff5571f611a9b6f27f7bc2ba423af829db2f7cc4d30deccc0cf38c196ed9141ae894f8dd6b4173f1f7245a47419b7f1e0439d385fce55de0341bd00386bf82ae8184eef19c6a956f9e118a30e0b290fda416beb0ce01ee5a960d54000000019a70a756ffcc5101091cd93c5444a1faee35c49d0911ebb9fba1dbdd4032e5b1f3471fe5c5c98aa46d81372db00459e43f80d4d95455f492a74b5072b4755fc iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1884 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1884 iexplore.exe 1884 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1884 wrote to memory of 3064 1884 iexplore.exe 30 PID 1884 wrote to memory of 3064 1884 iexplore.exe 30 PID 1884 wrote to memory of 3064 1884 iexplore.exe 30 PID 1884 wrote to memory of 3064 1884 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f977e12b8ce27c591efab06f0ba8803e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1884 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e8e11a4714ef8902108f0e77e9b673d
SHA17931042318d29417266bfcc5f1d2885370fb62d8
SHA2569c897005c34ae10164f01e020ca0ebb8f602c141a6be4292951014d9d2636e44
SHA512566cd9109096348bdb91f5c0528457cbc4e933c0d697d445e405dff214978ee3d6eff38083bb719ac071712d8ec56feae3dfe2356d9dfdc9ee1e9b9d5585656d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6200b1a28eb23803c9cd2e2fc077818
SHA13e03d08eec0158ea0af6371c9c7f2a803f36c810
SHA256abcf29eea8d4d59006eaaae79d418810570ecf6999781c258a0596e085614517
SHA51240672fea9fcb653494a16482494bdf6c2d29a1174fce4b8dd3cf991f8686ddd4daae84ccf0078661151ccb517332d8309effbda57da038e13fba60121c9e0ed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54644578de2003f4053179c340a3c1459
SHA11506d0a617d92bff8b3b4e89614df191811470c0
SHA256c4d734a1192347fef1b7b9278bf1aa90ba0df6ee0ae932b3114bc3005b702564
SHA51200e861eb628ffbac8f788c6552be7ceec19ba4b9770a325007617ec0433aa404dacb967231614e5abf0089ccf7f70bd7f47792354ac8d6768f6fdb9c5639ca18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b89ccaaaeaf90654238bd16b96284b96
SHA1f389202ee98d5770d399efb753a552ab98078f11
SHA2561b87ae0d5b7061b9c2750463c440d834aa8437ffbba83ad32b02cccef31cbdd9
SHA5124535570c39aa38ab31ae1ccb88807e771297a4ed0e6e11625b9f266a80da7638ba559d0f34d7057326bf980a43eb60439813cdc2500168012f042efab3ca0312
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a10ae7cce63b8edf226c1d0bac4986a3
SHA1734a4110c0727e5b5fcdf17add3d882f1eaf0cd0
SHA256250cf6b6953359e8fab2f9f2c5c559eae62096ab80235af813f7bb3440bb2bb8
SHA5122f8746d547c65fa4d15aee50a6c7fac8a65d1432f1c458c79945389b00254e16b2e801fe937551f29c8e4786e2a91f98f05f81ddc749e1097f1ff8ee2c5e49e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bda27b8aa65b38034e0e05be75d7c502
SHA1a1057898344b0a416adca82dcc95cfbbc7267fce
SHA25634a272eb468c9c48f35c34316f726f92c2116dbaaab29100cc53db6b01d4173b
SHA5121c05bbc907c7b4ddb88039303de5e449613a7f7734a8cd7d4dcd9c244978a4f14276668fd3505d50d4783b27162e28142570434317001dedbca1f2361e7ad752
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fc8d9707c30ef869924c6880b02910f
SHA15b0fb8c79976de2e15fa72117814cf95a3dbf70e
SHA256a328ade26fc5020d5c08404cd1a74a746503dbbb4a35a345ebf0aaedacd6bc6f
SHA512bbe962520705fee63167b329566ed8fed959cb10b2e3e7e46f85fa5760a894f423509a7bc9407d7b762bcfa7167b962073ef7d3fdfd215b7a6a602cf6276fb6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d65bca8da5492f232109c032a05374ef
SHA10ac2c64de9a28c1e2ed83d3e85df681874259273
SHA2568f3ff2aec97899bf5fc2258ee14ebf4b6cea5027fea970c6aa9e9147d6f9f8e9
SHA5120da71d0e6461f82db04ba98d86490d341b2461eb9bfed98fc4bcb79460d9603bbf9949a0ac303c094a360b043fdd604231dc77ecec3f27db75e9e20f880cbde0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572887c16d850c4f2421b324497aa4901
SHA138fa059d5f457fcd814c7fc0f50643325e85cefc
SHA25655f69d6cdd46f0244cd34588fa1e3e051c8412c55f006ca0c0364205592a4051
SHA5124bbf9e48bcdc871a007a57c2b4f9292df2c919cf498beebdbab1ba1bfa49cb8af37f92f378bb17e8d21cd04a17385319bd508f54dcd479de2e085871e5026a5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1112cdd789df467bd058efc8a9e23cc
SHA1e9e74bc45416179a258d235d1a9a4585627b0795
SHA25628adea38352277700c5376ff871f6d8322bfb7ba30a39f7c7d740a26a5628ec7
SHA5126815a73fa01978dd67584a13070c3ffe021ba24163acdad4551e63d003b641c6b4493f7fe86a7b10fdbd26645880df7f2978944cfe6cadb199f5abedf92b95ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5427889d72e3659a22cfde7f49ae88e70
SHA1bf4f96ae1d78d95b956fd5e8039b89a805fd2dcc
SHA256ace8b1c02e026dfb41554ac9ca139cbf6bcbbaa52ca24be877327ce670cdbfa3
SHA512ae1e79cf527a3dcc5d5374c027f9fe5089b6ae2a301547a24bdbcffda38a43e6d657a5b79d1576edf8c29a48548ddf67e5fe366d005235be0dbca6d55978e514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ba457a4420ebcedbb55d461c5729a06
SHA1f5fbaa622109fe2d540536287200ca2f7676292a
SHA2560b8300cd4ffcdb93987a9de2438bba9102593bb3dc8553fde4b98f1fe9576344
SHA512ad68149ef8b7ead4e7e0bfaf6be629c0539b95ea9952f64366e6592cb0249eaf3b1c19c37a7b16692197310f5ad7b37011ae9801774a57922d3241f214172804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3864ac27eb8b7c2fc627b8b450f9f5d
SHA1eb7026bb44379bf32e76327df9d815db51f0cd4b
SHA2560d51d1c1e56fb837448d7c7e652e70db22e44d75831812c3705dcf58106aa425
SHA51244acb85137710495f9ee4e321952c47c8fa99d747889bcd03a754454df4e3f08c51c187b0823c27d2a4648d8248ba8c654eff581b8a5f32892abb174542b2dea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5023e4769482cdedf27f7b8ae2c07cfac
SHA124e2790ec3426ad0d5c79a6e080eca02e7bb2e3f
SHA2561cb33aa7c68ddb302f54be72b911f89f1d7b0a3ff5e55f903cbdaa8bc4bc87a9
SHA512135e9aae47212c810375cc56256dcc29740dee56610baa1e637fe6e511f24d1eb7c27fbccfccffd222ce5be248205cdaaf098dc7fb2249f15eb9f26779bcaf5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515ea940e62cafe0231373c223f2b54d9
SHA198da308fe890172623745ce73a15fb26a2922dd7
SHA256e9e3a0dcdb0b629679ea81c03d725cc0ef66422ce50ce5a5c3e9020406d67c27
SHA512641336b3bb3018115d05383e2af3a8f128adcb4b96bf086baa865463b20fcffb771ac9d8f53a60fd8d4586fcb45896a6b595fd6fd3952062175d159558a77460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2b63df5918ac31630985d35c962427f
SHA1f5c8964fee66d3b2e822ad128c134ff8f571c528
SHA2561c8dc525ff253a1c4c9a03deb4ce74146a8d52bb6648ec08935c513a49dc4221
SHA5125163d5527626d374048d30de209a7330f4a7089f74dfeb9fd62737d635985832aba9dfc258b851e6eb63c1feb8fd2d013398e586a5f8e689b771858af4349939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e77f0e4a68cdfb19dbff655b11ac88f
SHA1983f3944bf468818148964537b48d4704b39900f
SHA25635e5301a26ea7a148e0d4b2ae2ef89667d5777a6a9cf3810301ef50a3ec24550
SHA512e025f9274b0ba44f1f42326a99753f130e1e7ff9b5c1a24560ebca3af0ca4a88b7a5fb0544152ddca1c6118ad84ddf4f7cbeaa2720fea5104bacbc74ee672529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56603bbcdebd361b9d9f16e021979c10d
SHA1326a4b522aa172accc7ca0514e7b6913afd611fb
SHA256b249b4735c60a329ee451050a7f7af83b1012fb428dd01774a74ac12b419b2ae
SHA51254e2d3f2ca82f59a35f83766ba4f256ae5f81f3c41518ef58c45cece21eb4db1bd8b26ee0ddf476657c628d9464fc7ee6fe16da0c71abc33038c16dae68d2182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512bc9a46cb824d63b5609d7881c7a46c
SHA1fc83d1d8dd34dae4ab30d0fee0429c50ad838015
SHA256fdbe23f370a30a7adcc85c9bc37cc425e596754d6377a9250fd72566627d3baf
SHA512532b54352e4d24146361c6a4f368ee91284a5220fc211bf3454844bf3e517e183422fe5522fb4eaf9462003b6134e85a8f1cade18e810d37d7e83d26923021fa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b