Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 11:52
Static task
static1
Behavioral task
behavioral1
Sample
d1df0e75072b249b798544f1a0bbb5e1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1df0e75072b249b798544f1a0bbb5e1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1df0e75072b249b798544f1a0bbb5e1_JaffaCakes118.html
-
Size
66KB
-
MD5
d1df0e75072b249b798544f1a0bbb5e1
-
SHA1
9315505a60399e81a6311910e1938ac92f25a0dd
-
SHA256
5bb879612c52031ca8dcef7d8c67e61db8cf57ce02b622b1a0e00b507f2fbf47
-
SHA512
1583940e74584ac86797c2730741698a40ef2d481dd6751e2ab404bb92cc06363de3c7806bc60f08a85d39fd5ca24f51e597a11caf7ac529a566cefbc5bd089c
-
SSDEEP
768:JizDgcM0St8tN99OIs8RFEgFOhCoTyOqhCZkoTnMdtbBnfBgN8/oycc8QFVG8sPq:JGM+PmgAhLTIgec0tbrgaCcFNnzAC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431871834" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 502ac3c71c01db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000064364ada9f30c4d763ecdae41c61375ffb6f0f2ac19d57e4e92b02530bddfc0d000000000e8000000002000020000000ced62a121392ba5c8e399da9e777a70e2513557593fe925d254eac642d6ee98a90000000c7fedf711dd8333bc1ad9badd3f61fa8d04542b89021ad3549be66b6ce4ca2ae5fdb9a4f4b3ddeed7058d0e269aa23934d93d6cd6dbfbfddc6af3389fec196a64e91ddcf96fb92939459283256e56a56f69fe901f2bb75656927fc4cb9c47f933567e0f9090435dc107fd22cac9c030fb4a024b13915584c87b38dbfc2aea2b56e60363cfce382624fccb8ea7b72d19940000000e74421cd4547f8b41677a85a3544aa9262709ca8abc63af9f2f9ef2b477bf38a073db694cdaf4abbf6b22a5f895dbac22cb2af2f4e29976f7f751a1a8245eb4f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B234C311-6D0F-11EF-B439-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000002c54521876c3930bd11d554624aeae2bf8bac4db7ecd8f6ff309942800bdd851000000000e800000000200002000000062359506281b480f29d94336e2228d920ee74364539784865d7ea48917e86a2720000000db56aef6efabb30d82398cfa8edbbbcea3e9ac33b411cf0589dcfb6eed43a28a4000000049ba8cc676f60cbcfc4d0a36d4adddafe03712e3c601c56fdecee0b14fd95bb51d845e120e02a7e941d50ab94d2ccf8aa729bf163cde7accd47155301558e113 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1076 iexplore.exe 1076 iexplore.exe 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1076 wrote to memory of 2576 1076 iexplore.exe 30 PID 1076 wrote to memory of 2576 1076 iexplore.exe 30 PID 1076 wrote to memory of 2576 1076 iexplore.exe 30 PID 1076 wrote to memory of 2576 1076 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1df0e75072b249b798544f1a0bbb5e1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1076 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58895ea78dc5a2c5b86c4421c516263c6
SHA1ddaec32e24936100d586f8b4a850453f7fbbc2ab
SHA2567275e7ee7b42f9ac6dbd0cf1da893205884281a59cd92b3b289240bc83479887
SHA512c58068204ac3824f679affdef92cc587411d2dc3932bc617585b9dbce47c5eba9663368b604ae4a512071abb012c7ad6c24cc172464f8619671ec040fbd55867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bda20b468ac2c55771d2d90e7d06a3e
SHA1e51db0ae9099b89b23a1dfed352e58ff29e901ac
SHA256bf980446d2369cc5cef080155297514774b5203fad7c0b4a1f9dd0f91988c365
SHA512699ba3055a3e77d227fb902c9c3eec86597119479c76042607c2c7937bff54daff2a729c02f7e3f81ea84c8e1a3ab1b133040d3e18dd0d7527f11312c9eb79bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58315066d950a7a20ba762e04ddffcb08
SHA1bcbbae06fc0987f5aa701098480aadbc579ffa6c
SHA2562ca5a773e46c30ee9cb36cba0d1cf00b733ede14723d8f97e9a7d18a899f3830
SHA5125f6441026a79d9e3fff47406a5d1f9abf7a25997056e11145c82427f9b6b74638fea2a6070880c83e473044087711b8202658f0224dcc69f95d45d9bc41d04b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c884702582472566934f2f245ad27157
SHA1d46e7a10c96e6017d083a8a2dfa1c21183aca4b2
SHA2566ae3d714450fcfd56414e80d65a7421d93639888c714c4d4d311bbb0122a1b8c
SHA512cb8dc58510f4ed07413f2eaae2585fffaa0f724ae9627366cf9bf4fbe17ab877897c1da71c8cff590bacc6f661b6dba9f14b92c4dc020235c31e47ebdf5ee61e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538923f7c1d4f881f8944f9252dbccfbc
SHA1eb04e70f71d935ca94bf661dfb4212272b11798c
SHA256d6e0b62d2e7a9ed2caccf383343bd9fd481a5f9c4f3a6cb344f41e09c295ea03
SHA512d86706a7176be747bc1f039cec50112548cbf5a69f176204ecf07b07640f69dc32af893efaeba2f8c458b87f33f1a133c305abbf1c7118cd647d79bbe903e76e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea3a646490c903bbc487ce7ab429d6fd
SHA16e83a30e051dcabb3e6abd7274cb5f7f67815638
SHA256ef61929a91e7c3696cf89ff7e386360df7ffda2747aac23910b8a98831025c5f
SHA51291041524d4aad2cb61aaa4e34afd91afe6360afeeb5158514d987d6303195943897b73a1f94f475eecce1d54fe1061ee008499e974c506ec737be6dc233ced0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566743146f72bf89d3ee6f31521deedd0
SHA129b38da496c230940e26b59e3dd6b7b58a9423ca
SHA25686ca3ce4a1933707b13ce12be05a95f3ab1dc8db8332610afd1ced0db295cda1
SHA5128b42e60f17a3bfe320f23a7a90598ddc283c9eac00a33040bd9762ca0b6607818b91c7a9566b587171f4bac05b93fcc4d6dfda9baeaceaee60e01042cbbd2c3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547f76490143ae6d2aed6883439b1ad34
SHA1f9b17d4d2672dba5820c6fb52009b47e42397789
SHA2564cda97917526b6a31a33fc5ab2a3152efabbe01ce429b9a7c3c122e17d91ed13
SHA512ea207679e12e7d0f0cdb5ebbdd7db8633f8cd0e8c7fc03cf5d7d3b11ad5a3925875c00d033e0867d9427f69014400b33197bc335b836d4e84404925cef258342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58049b04172eb72b8a992e9169d76465f
SHA1408ec65e3438f4131246b263582a7c0f9f7dd7f7
SHA2566c51b43b5fd8f0f1d91c42eb3ccd6e355f537ece0895f18f97af9dd4443c8f09
SHA512f9226f63978872a792e391c86864b542d58455ff9c2d64263c9cc9f7a18672d003af21df4d13c7d7719a6b719219f69e1e1df7cc1146c0027bd9e420e17be8e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9c4d700bf8d3be35a4b693caac8fa98
SHA10fec9859d3834c06c88ba42ab26d6714af8de864
SHA25621c3f65639f3a43a53fa254098bdb9e9c420896305953bbf65457038a9cc0671
SHA512b1620ccb6af021173af55335fbd4e09f4cffc8b5acaa359aad2df62408ab70a4521bf7e3c8d60f97d2ce37e800809e236ee69bd367f7d46858f12635d25543db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57371358f80e9878b95dfe4877ad2883b
SHA16fbb8af4df73d2503f224750fbd3056c67908a3a
SHA256b4b13ca4348a7ce44b2d530c36b147d71a1902e310c0322ba4585ece63a7c6be
SHA512adf5b282e6c23d6ec58bea517d749b8eb49e77e31c4a5ba81d826ab1efa26bec38029b269dd6d43e58f40cd11c023d93fa36d5fb275caaa43b146ac4d317323e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1e667723c7f9df970175e6dfceba8f1
SHA193f93fa8ae1b9db5f6e87f53ba0e7d0345881c15
SHA256231e333aa33541834a4369022d5d28401df2f9ec9453b3c0e92f6684b27347e7
SHA512f5b9ebac483e33091b03fe8db928c7991ab8fdb1b96b5e3403f00c393b76cc5a05af70c29bb01f9a93a1f4a1fd016fa5b9e73fce2a8669016455d3c731c36aaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd4ba89361166f7d32e4d2e3761d8241
SHA13702cf955a65994e59a6be00f618fa44963ab05d
SHA2560e2c04875eaa901ab840c7e105f1e4ca0910955a2a8202086696af1456dc8015
SHA512e2c36e06f335062d86919a3442d9bbf72aeef59e9e1a50baa0df2e70c4f554da784e34dd1488209296d2c94d9dc1a514be24f45825a01232919620a20fb4f841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587e9944703f98f7bf9361b2b81e3311a
SHA1cd7338362c6d1a8909723aee8ef2a235ac2a941b
SHA256e6fd0f0bc5f305c478f03d805e81a98c00cf6c89e4b0aab0cd8264d7d8e9f100
SHA5129dc6b57c072c97129b531866bf9a040e14850c3b4a4b768d50e820ab4ec4cb856e20b90640939af208e70b836fddcb406a8d31d657c1db079b3ddd08555f964a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a89d576679a809db51c5ef5ec6aaaff
SHA15cff1936d9661377181ce9b16daa79859052fe38
SHA2564c54b6ca07136e133263db740390adbfbf9b1ee4590ae7773e20097f367160a7
SHA5129700e04addb0154a7a4e9521eb67d780a2296a045de4ef2e3152738f62f37eaae115820219f3f083b43e22b51cf1abf6c0c68af94a5b752e5488459c5b925978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5105be69134215dd0cad06709f2f7708f
SHA189aa008a15a8f38fcaa1ac80a7f8b619df168588
SHA25632f40bf7e6f77edfb21a33c12fbc7329e7ee20cbe8de3dbf973d6bf98fee3767
SHA512eb36c8b020b8e029be823fbf17e060b32b58b340c78d5a5fde459efedb2a935144718e54246ae2e66d06b3adb07f67fd8a53a5b6cb33c7b42334b5e4d89a4b72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3a1ca6d2b2a3e4bdaf632ce2b80afa7
SHA1b353177ad08770026f1c94b5d4cfe019f9a6c6dc
SHA2566ff0fa9453625d4055e39a36c1bec310b78278e7a43b9ebad953e3b213bd15ab
SHA5120824d329af98f5d135b319963aec2d160f1ccb2c9022439d42c1d669c762cba801ed229a4a6a938ad9907212b47fbbd2593d603e01c25b66c30a96523ebbf4c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597d2f684ed2b454533778779443171e3
SHA1776f739bdeeb4199362850e74dad98dffc58235c
SHA256b8d77def391a34143ad9ccc1ff92eafcfdc2d4d40666b846a122fd4ed01806fd
SHA51248c68e0e88e9a65e1a8779b038d89112a1b8a1a215282f5751aa77c72c678ea87949acd5e50a134ee811b387dc51311f697f7facd7504218f771f21d5186aef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4610fb7e4bc8360c570e8950b7bc352
SHA1ccd91972559a6744db070b5a33e25755e0f2a953
SHA256312facef087753bf59073c36d0607be6e22fd626a544db0bbff1fe02ed850c78
SHA512eb3ef9bdb2ce3970a0246c97d4d41bae1ecc22f45c0deb932bcfa38299b5fc25cd7bae94cca9b9b5f062733dea29183c99636b72593dae5394c535ec028e5621
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b