Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 21:44
Static task
static1
Behavioral task
behavioral1
Sample
078a1cd2fad6e82cf55725957f0d7005_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
078a1cd2fad6e82cf55725957f0d7005_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
078a1cd2fad6e82cf55725957f0d7005_JaffaCakes118.html
-
Size
4KB
-
MD5
078a1cd2fad6e82cf55725957f0d7005
-
SHA1
d9defd83a60bc49b30ab40ac344fd39632c12ea1
-
SHA256
9a371d3b9aa58bd479d9d952b2318373173b6dad7ce997759cf971018257b084
-
SHA512
89d8ea80662073f16cccdf7796a9dc1e429778fdf66d2f933f3afa1ed6c0845a531508c668207c9a8d1fbdc2cc33fbaee5abb0c6a302f89c8370a5d635ab81ae
-
SSDEEP
48:p9rnp8URQPecO+8+D8F6DASDAdEDANADAaDA6DACDASDACDAymA0DACDA4DADLCc:p9yURQBOt9FELn35Zf2Vz9Hhxvm7bJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433980949" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000385bb015ba0bdc0244ab5408b41c7e62c3d5c17054f3bb51eb94a138ef827818000000000e80000000020000200000009c0e41d7a82fc1f891d8952eb8f1ccdb34a82b2a2cbd0b0a9fc97ec0143ab43c900000004b25fb9ce0796c80cbcb9c7dd388e0376aa5621af51fd38ea2966de41522f65dcf3ef2dfc13aa0c098372dc748863b95f56231c7d2741fcf36a8a8dc94fa2c1499d63f08473fb2fb55d5fd58e2af5843f575e2a199b8d07ee857e92333f263fb4f8a529bca42bc5108d12a802963cb02f69f968164fb14dabebcd0e28fdecc0eee53533c011cf9cd1ff39c55e6f077ae40000000e419a525a4b16a197ab12b865c1bf749a20c52e37709d3bfba687ca073d0fc76b367a2ed8009c4002d210f3de448531fcbe3c4279e32bd7eb116a885b17b93d8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5DD68BE1-803E-11EF-A2BE-5E235017FF15} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a09413354b14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000e235e282576157a4febf135e341a95bfcba23e1c4a1ef0654f663a1a0a17a428000000000e800000000200002000000092e8624dbd7fff16dea7fc764363120166d4ce3ff9cc2474e08f145da6f3cade20000000c5737f315b507cc9067d87e78bc339b5f7eb665beee2a95f6d96ef0261eac6fe40000000d9131f5dfe8671169ea965ccbf092973844a1c83a233cc5f1e6287d275b015225e96da3eb8f621fec407857dabab588a65f6dcdcc45d465a4f3edda0277c409e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2908 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2908 iexplore.exe 2908 iexplore.exe 1772 IEXPLORE.EXE 1772 IEXPLORE.EXE 1772 IEXPLORE.EXE 1772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2908 wrote to memory of 1772 2908 iexplore.exe 30 PID 2908 wrote to memory of 1772 2908 iexplore.exe 30 PID 2908 wrote to memory of 1772 2908 iexplore.exe 30 PID 2908 wrote to memory of 1772 2908 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\078a1cd2fad6e82cf55725957f0d7005_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2908 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b83cc86caa6a76fa2a9526ff8b7f66a2
SHA10d7adf6a25c86cb4a46c7a728c54dd5516d3e017
SHA25633c93bf579de3a708fd6ed9eaadb61a59baca7fe289694d95c8e13ae2e459e79
SHA5124ee3467dcccc8753003eaf4f131c21d4a6895e1b7567d361f18f10d6dcc3b3b00257439984389d0e1d5e62400cfe2cbf8ef9646cd1271a826c765c42bedd4af0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507680d62dd04ad3af4cf22dce5d07bf3
SHA197bbb302480c85864d49471c2184bcb0f1423450
SHA25693faa0bb2911c5c91237290178aefb00122aa2763e80de21462c3ff58ac10a6b
SHA512fc2dddda5368630262258cd3390afdda44b5e74dcc92ffef6ffefd474db5e3889021467453e7ed0d72b87e720ada9e55ab10c3f3fc43850741c8435050a17bec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7ad0f59c9e9bb816123884950183710
SHA19faf7dfe4ad2429ed126ae65bf6a2c87668886da
SHA2560b01854fc331ac58b6101d3fbcb55e1f944b78e590c94e9730fe45967e4d03cf
SHA5125437949dcd6466e64b8d8f0bf1a7f47aa94cfbe1220be6b0ccf503d174ee17fad25a3bccd33a008d0db0bf6ac451d1543b883571c068d2f6ed4440c90e71dc76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abc4285f62043879419c68ce3f5568ae
SHA16222310c0edacd3ec05ac0263c51605725446660
SHA256142c75869e7ac6d2859b1ea18ce874ac1efc00cc3c46a569413493779a022ad2
SHA51245323496489dbc89272f81b535586583d8803937320fee21adb659a46cbc55433952a422a5c518ff3174233342e414f5e4b88620b4f41ca04ed8430d10302863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57634938da368fe78bf44a04c1fb28599
SHA12d30fde03f233ffa13356e7049c5296baf6dac35
SHA2566bb5927b4eeb9e31cfc299f090dba8071ddd1f689c5d52e30028d77ea04c4f3c
SHA512b828b29e53f372e2008b9fefd9b0719dd12870daeb806fea29473ee9e73649dbdfdc270546be25c796302e1546cbdd7681d0db3951941cb6e507a913467cfe7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bf58c252e735dbfc9d0133524432efc
SHA1971323a21eb6a4e48f95c901759f437ef12b1d69
SHA256bde8adaea16327c7216b965a3e3400283770aede8129b9e60fa0a6279f38c974
SHA512b163a8362339eb8371e1c5aa4b1a8e05778d816756b4d43e9538c1069d30ab8d7f6e19d25d2fd2e4330df46681e066d1bb55fc1d54c4ca885dd7e6e37f2d3ac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cecce29a8c393740238ea54863027100
SHA136bdc81df1adf227d46a8d656c0309a7d8ea9649
SHA256f79b17d3a30316ffaad3643afdedf1fdc31fb1c7996e401402a8ba3d8364905c
SHA5120c95ba7377e2729bb3015e2c0dad3c181dbdc98ef9de16859edcc6dd4f2be495a84cfea9bffbe0ab3de9b176ab698456ac950f93f20c0002596338ec6d5e2b2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe24c50568b3fd36377b0dc90856620d
SHA1f7d9047745f733de6dae31ba0a6204fd346f36f6
SHA256aa4169966b001e8f010076960732f65228e708dc6e90f6842565353a84338c2c
SHA512e6887b35c8384eb4be9745e9baab4da6679ce2ae314d42a6c8063417f78f8773ea94ab7ff389c07c8486ef3f3314542bfce2e9949ab7203a581d819731199770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fb93bd95cf8c076e4a99809b45eefde
SHA1af6286ec660b67d0c17ad368abcfcdd49a624730
SHA256e246f3af6d12a745806d7c6dc1938a33de113187d37ccb1476c0a3c826c282e8
SHA51228a9e9f2e2a4996fdbd514f06bdd7d0b946a09e6085c8122ca2d24e8eafb3e5ca16809ff0adbe425c5046764018e0c6b5061019c37b79e5acb7d0439d279458c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c246f876d8409c831505efc6feab421c
SHA15cfa85ef66af5cb8df8a55af74bc11e0f913ebd9
SHA256d2bc9fc74a7aa4b6b0e12ae157d12554d3e43f4666d0b16a3c5dcf4de26c10ef
SHA5120a150fd03a1f3e66db5fda291d7e65846798beb5fad2867ffb2978c8607ac249ea9855e0c2c412aee75770ba574b34da3fad2f858353f08ebf2491bd852413f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2af51b1ad5ae72f3e722383d4d2e6b2
SHA19319d8b5675977bb6ae7a0e0d254237b630e2b8a
SHA2561bd030d389248afce44afa9e18446a0a7f182889e903db2d8749a4b5acdaae28
SHA512477e47db67ea7170249a02be1b7f7ce774cea7c364e42df118a673aad1d05d99a814b3b792c7cf93c82d17f652d62fc290338a0888bbceec536ed85f4248235d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b40473efa37e8771b2a3da67444d8763
SHA10c24463bff83a3de4dbf36952ba7a7e02955f15c
SHA25615419d41b13e6d87ceabd075cfd1ff18bf0e0c3c598a8160bc90f921140a99b0
SHA512d46d4637a5e51c78257e97e25e960a6de4b89648748343db06e2dcb81a0ec5431f339cdf51369fdacf10fe9c59bc3cc48c49cd3211e458d1db813d84965cb130
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c674678a78fd511d3f9c10d8b96083e5
SHA1be9187120d6c34badb1ef79731295c6cae25c787
SHA2560effc905204bf8381f266e8870eb20094bee02d15071ee936c13495223ae34d1
SHA5122b02809e5e841619f11215dc3b8b6da4038c5953d34e0e2f1cd6b2caca30ded7d491aabfe32a31e4aa0481ef27046e49795505362fbf78fccd375324bf841a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1f35dfe7f0688f7ebda91a6a1b10764
SHA1ba607a0d0d0729cb2e018341f156e67810be2215
SHA256a8c3b663bc56dd0ee5b669be9cbe9d10ab5606729658feea8e9bc7c8859e79c5
SHA512e3e360d091a8fee836678d658bf8d9137f769aec83a6b370060e9bd0c716917bd11dcbd6802de3e36b7fd924e19f818639accb92cf57cff5e9a29eea30b3f346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6271ad6009ee2e9700fd94b9bc3f76f
SHA11eb726ef4ff5f0e001875ed7cfc2120192b050ed
SHA2565a25a91af0892f1d1fb208ba4301246fbdef8b2ea0b7854097b3ad70b4cac98a
SHA512301668e8e7baa70f2bbdd55d9a7741628405ef4f84777bd0cac45c11c98aab4e2e0f6c098c9760c235e4d05dbe40b27915fd8ebeaabc2222931a8abbd8277d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ba5546a6bbe7009cf626ef09238dd5c
SHA10a1d022fcf3105ed39063a25b3e8111f5ff767f0
SHA256bb5b4a36c05f1aa9597ba8c5caa3bf4b6dfc6ea1da11331128d1c73636348742
SHA512883ccbf64b7c7dd0b0b34569a2e4303218164b88d2c28ba39dcdd58bf668ae408de9b70fe6db59ea528b54c4228aa0adb01c38de7c2873e414e93b7912a08bbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd47e7ded53d9762cdf95e24a7d5681c
SHA18621a4ff15cbaeb90b702df66df8a95940849794
SHA2566a98947ca72b92392de4d37d8743e724892d5cd3e165fdeb91232b747f805a8d
SHA512735155f1d75d7d739a4d39d920b83313996dc01f06d2bef237ee28694de4145cd6cb445fc6bbddec2499cb0a9c140146e6c6359f19d048907a49ff34fc753eb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d29e72c2865c37c5339f825e727245d9
SHA16d558a1436f17294b2b8ff5eafd6e223beaa5b02
SHA256c473ecda9db637f632256a2b522979be74e9ee79ef4e91de3e81e618543ced17
SHA5129d230fa4e5888cfe47cd951106e796fa8d1f3c3c13960ceaebd9c200013f00e778a1607e62c5367f6878a3a1fa43a3660275228af2b01e528186de93be9666c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd2b84b7916af0c10cbfd6e0769f8a03
SHA13a73b243380783b57748c85fa5a7b7c646ccc63a
SHA2564531af2462652888bac3a60872e07a7195e86d1f334939e93a640ec6702b5ca9
SHA5128561dd296f97be9a63b3f2edd35ec7f2cb9f0bb81f9207bb7d0fb12c7b5118d667ff5f2903bbd2211c91d3c384dd18a7a09717cee29f18066b06ee2087f26b12
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b