Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 04:51
Static task
static1
Behavioral task
behavioral1
Sample
f9bdeb4ead4e497f4f9ec008f7b07e13_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9bdeb4ead4e497f4f9ec008f7b07e13_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f9bdeb4ead4e497f4f9ec008f7b07e13_JaffaCakes118.html
-
Size
94KB
-
MD5
f9bdeb4ead4e497f4f9ec008f7b07e13
-
SHA1
91436a6048c57490bc78a2d8265b0c135b915b62
-
SHA256
c4ee7373aff42f5549c1a8a32696aec9d196fbfd834d1d9c60b5f68a94a9b904
-
SHA512
5cfe3951c2ebeaf964f64daa566e517114e7e6426c6b90dda4b4b2111f030e0f405edd1fc5cd0a7660958e3ad0322eeee73b568b2d768e30515d65d50baa7063
-
SSDEEP
1536:WMLiNVrUlb8Kj3oQ4f27L4FLtDpFwRANkZ3yj8lBdkrY8mgHC+qpEyW:WAip4lBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000ddb71c6ba6eb2f0e3bf1978c1c0e202aaa5d0fb33012609e2800e81ccbe21663000000000e800000000200002000000019ffea490a67ca3ab6fd52b595f6483224a47c12b84862756d1147ba09912212200000001218d5f0e0f5a9aa98ba3963eb4218c47405785114374f50591bf5ab7bb191c4400000008e45fe3654af8cb33e52df0e01bad4da6c23c5d5662068fd11422698ad839a91c6c09037efcd4c9b2e135870b8bbe628e7e45539f2fcab844cfd641feecbae16 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433574534" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1A54D6C1-7C8C-11EF-A02E-E67A421F41DB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60d81df19810db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000047bce5aeaf134f021b48a942bca87e9c95cc8fd2015d87365faab7e52fc865d6000000000e8000000002000020000000a75e1b4377804f7a5cf90ec3a90c5a78346a2938e94b5d737936fe18364899ed90000000bd39e4d4128f8a5df9d7777a4282114b19f889231ccfebc1ac7e4ef5398a8587d96caea3d3f287972e00a248d2b2c123a8262e0f33dbad716efea21978070fe0c7facccc0442f335f337fdb24ef02c9f071bb9ecceac23ba5e31127c10c7ef2ededc7fbc60ab567badc3a280fa5fce09ec89f689cb6addd93056ee4f50d71dccc98ac6837c0ce481c3cb89b2848ab473400000008557eed663d5016b38d86e298772689f99cac939a14817b5931f5ca19ee8bff7bf4108dc90c467a09f1aa1184519ee2fc11210aa74be774937f3ca7bf6d00611 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2684 2876 iexplore.exe 30 PID 2876 wrote to memory of 2684 2876 iexplore.exe 30 PID 2876 wrote to memory of 2684 2876 iexplore.exe 30 PID 2876 wrote to memory of 2684 2876 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f9bdeb4ead4e497f4f9ec008f7b07e13_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574f519a1f13f1fd87a491c09c93ba230
SHA1b0a1ee4f837dfe7cabff7d8b53177b58bb2c1353
SHA256fc961516487bcfecee04dc2d86a30c3a2023c90ca76c1b9ce91ec05c4cf97c6b
SHA512088317a9709324976565d8d4d30b2fd0f25561350595f52b105762ae422dc018742dca9d5393b486ad63b0ab7f134d27ef3d6b41cc0a2f9d346a05765798b965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec3734fcf58e2f77b10677356bbe4cc0
SHA17ce22e4cba1e61d1f8bc7bd2d2e0a9447834d98e
SHA2561971ebb608f94d704e445e333a7e2319f85ce86a060f2bbc5b48798bc816105c
SHA51216880fde99396cdff6e041ef6ec688e77f31106b78e02a8714fa255b65aec73ed365c1a6ffa47db1ef3d2282b8b76678dd5c0040123e051155fc10626b093b32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c35fa9fc606894725d696eea44590b76
SHA18550351f75a7988c6450166064fd7d2cc7f47a80
SHA256474ac3c32020c59277f1d0145f118412bdae2a5a6e26eb7cc4b850bd6d9ce337
SHA512ba6643326a05912348c50489a64805ae77c1bc7ac5612261d650825686af2ef666dffaf1969f8cbb54d721af556b52925f47b3e2a59d870d76781f837c17dea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed4ed67cdbf3f16dc5aeacb57d04b11e
SHA1320082a7795f9747c35a2a7c0d428a93002dde4a
SHA256adc3f951eaad30737422936d9501c112db8d2b6ca57400c759c6d89ca68b4e35
SHA512b1538b9139755cbf701fcd57d3390f010a22ddd2946404c104381d8b76e987b38345572e7faa41f25dcb92422a2fa2b3be55ed96460a3d5247267cb49fb92a70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5cc20c211045dbd5119cc011428c394
SHA13027e25abd3417334129f874c1c9f38e4f884c77
SHA25692e28a44668c3847221d4b1b50bb8d872c9b0278aab35fbd6209e894d921f5c3
SHA512f98386c016dc472aba4a1bdb663478b3ec214c11ce99dc54217f335f1fd79592bac8006cb869fd290fb69142d69ef3362d2faa836a68164f0f1ac6608281504c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8e4305cdd7f3a1b1dc7ec04f3d10803
SHA1ffd73d0634c6a20b1a06bc2647e2bfcf32b6a16d
SHA2565e8f2eba3ba3debc200459eeb84da0e4ace850a6a8b9ce079c3fc99879b6a0b3
SHA512607134c530ee9944218b3803fc1999b2c15d71cf076d87a79d86d9d56032b392e58b9a1fb5803bb37643f867bc01af00850e71fdbe4f092943851b526ab59506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bf85fe9163b7d6a6f710421b4abf25a
SHA1a281371c212e164be8efe3f978a09991110c9b9d
SHA256d8ef2514d78e5923506b37915a48f6a90f409514b465ffd85ce7157510eb8c9f
SHA5128dafa024627f46d5a415979bc83084225f2415554186f85358adb9b513fa58c599551992980342ed2559f7e2cb13059dbfeeafdd570f2f7417de70e02329e97b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd53c0493dc7bd68cb0091af6840be04
SHA164271b725c7cf86c12986d369f6b7f21ab01d87c
SHA256a1048e98a3534c3b9384ca34edd6017c47377405bbd50ffa5f0850181195dbce
SHA5122221a3650d18127a537b4b17e2d389cac06d14c1e9a7713e50821219b436f92a4999e42ba96bd5cec73c5119cee93a0bb905add0a5dbb93af76e301dd4213ea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d65cfe5c9de0da6b5046feb2dcd96647
SHA1bcd9f23af9d2e9111ed7e5fd82856bc5fc50955c
SHA2561b4b61d0bb8e35ab2f209a3ce0ac47e63fa1f36f609d5c3b6c9bd5aae79169a9
SHA5129fc71e1969c37ec96be1dc917a957dd1fafae41df6025c528e6d7fd4320b54caa2dd060223026982e8222804fbe5b397f63628b884733d1aefb5b93b733c4ab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fd0e59877a40b528b57f556f47b2b79
SHA1ffce76e64daac6930cb60346a151ddc1f43d46a6
SHA256110658566d07dd8eb0b3d9342a420bdf4ace85493af5b56e2082bae8cc9d7c13
SHA5127558b05788e6e3756ef99f47299d1e2525906055cc951d994b0d4a2154bb7cb1ca14de4238a6e0fd3a20cb77326478ccc4665cb84c794ace4f87e24eae14c8e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2a63aa67ed211a477f25695ce163cb3
SHA1326725e29e9aedfdb138962c1773d36c0bcf3ffe
SHA256b608f9c981b76ff5739946e7361182bf93ad6a83164a04f647904589130f28c8
SHA512b5b274b36adae759d49dd358425b7a50bea0d34f099c3027af7f669683f99aa6bb93e03af2f63c7df87f17582895f5848a52ef857ff36d327e55383dc4f6eed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507e47433ad6714dba9b668b85aa5aa4c
SHA1682a4f86e6f14735c0187ce454c0bd25415ce2a9
SHA2564bb7d14db2f0d2c31f85478e77f22717f3e8db003aa78050f2647786a24c1bf0
SHA51203609def99045b0f6316b9226405cfe64fc8fec210000a59fe7849fc87be42fce27084f6ab6581f9c6af2d6c14a8ca384603a64aca8614224d2ad9cdb4d484cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cddb346c4c734f8d670f36f74e6066d
SHA1944230f5a690c9bc36504ad2f8bd49bf5ac05726
SHA25633ba4ea4555504e2cb825f9896d7d17ed87132e22fe0c2f58297313bd6c5c20e
SHA512b3bdf4a0303a4d8193f5d0d15bee6fecd800a8c471ba502e5fa5088cdee2d2879d12a3f715f303f5b8e3c8767fb2ceedd1cf8b504d6809a097adc9a7cb4ed3e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a3ad46dfab9f70d589c4f994c9917c8
SHA1227105acfb06345f0ebfabca878c9731c82c4214
SHA2568b1bba6d7de21eddf330c7daed8961e12c5cb39cd3f94e22fcac5f9522263253
SHA512670984786e852c358bfac3c8698eea379cc166199ddc56d18eb48b0a1571e67049d56f5800bdb9dc59f550cafe91aefdee9a9c004046d5a18376b4dbc17a2e99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca9bab3c5e11d19e94d610b65d67b00a
SHA13ee7c63701adff88f0210e7fb774bec3474698b8
SHA256f4022d9031a765c9f6a83d436cf7baa54eaf83d0cc56157e878c8f02205accbd
SHA512facf4d691ee3e1c511e75a4bd697ee9b96efd732e4fa059fb92a298fad086cabebd405ffc38d203a177a6a6374082d4318c8137507b837576f89921fbeafe105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b98d1f1977364be8ba03437a2d66d3b
SHA1a250ed0cd127b6da4def1433b8a79d6ba9771505
SHA256e7dfff38efe3d04f56f43eb19a412c7cbb858aaa8d0b9a7c9f9d5fcc0ac5f699
SHA512c104626fc935a16dcac41eee12078fef050fa28c79717b245f76c1ae7acd4528df7799ca96bbf47449621447f9a26df7016835bb6628e81be8ed7caa47493c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511c48d3548b6a0d4b60f9344511a595f
SHA13fb1148a1d0b1849cc627ba42ef8fd376ab63e7c
SHA256c63f4147664ab0f8a7f6d5b6ab5c7aa5abc353c6db3126a506f80a1edc883293
SHA512063054301fa6dc747076e9e53e7928f69ec8e92d63b4e4c55898be5399c74783be2c7a4613c440f91ff24e877beee950fe39fa6123739a37efaeee7c8744d6f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a22b58ce687c7c7224f3e139b2f613b
SHA1c0b20c862e7ca1a0d2c740752a43646255c729c4
SHA2560af4515c50238639ac0d7c525822c58bada4b061a05fc4b36b8261cc480e0b38
SHA512e6cc7b45d22b571eb9749464dd1f30d0b477aa38d91b7d58bec450c6a455202bacbe6fb0ce07b94728f4bba2d3b842d59ea80c2b6d7de93b0c2b0ad88ceb1187
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\56KJ964X\content-slider[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b