Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 14:24
Static task
static1
Behavioral task
behavioral1
Sample
d67fd93b0f680225eb5d388d5d6e0856_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d67fd93b0f680225eb5d388d5d6e0856_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d67fd93b0f680225eb5d388d5d6e0856_JaffaCakes118.html
-
Size
6KB
-
MD5
d67fd93b0f680225eb5d388d5d6e0856
-
SHA1
8271549e7c7d45ad1f566c4fd147e583a92318df
-
SHA256
434d9f24acfb19ac3182387944bec62343b7e49fcbfae2ce7dcbd50d2a91f282
-
SHA512
21ac327fff9150c16547b72036d9f7195b9fffb4179e9697337868a0902d94fd36bfb57275bf67f37fb039e7dcf3775b40e82dba7d0120eeb9e7cfbac7ef5361
-
SSDEEP
96:uzVs+ux7TaLLY1k9o84d12ef7CSTU8ZcEZ7ru7f:csz7TaAYS/zb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 701ed81dc402db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000fa7ceb8b2ae4afd1bc20107c37a92da7466dde656aeb1be6cd5791ae47f03107000000000e800000000200002000000014cc8f67833c8832897bca5bfb99cc9ebd13f7aad9ed58debd246006e02153f790000000d2028b062bfb80e069c5cc4fd5cd2d746330371ca1a392784071f8dc798dcc73bce98b80bf4be088acda0f15ea9fad7e4b3ca128288616bf4c529a18e830f90c0d6a72521dbfa6635e447cdeb3506cc2cba76279477e972affa919fdb42666d024972a292016800648a59a517c3c4859363708fc95bf67abb93225656b272f3842327493a9c9d184151d1ee6dfe6441140000000f5be0440a61775640d4425ceb16ce14df506ee44ca5024ce8d0bb7ca170567ccf6ad7b6c990d0abc584b87262bda89f3feff311fe8a9a9a7b275f4903f3ac6a2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{41273DC1-6EB7-11EF-AC61-4E0B11BE40FD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432053749" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000069f54c70ca37659671bc86f1e4a8b6f8d199554ec7a98eb211076f444b54c887000000000e8000000002000020000000f2c43d5daa199f2350919a9686d3e8377a0eb2773bbabca0663f9ef0b862e82e20000000268af1386bf24e147f27ad83ff93e457f3d05c0e7d3f8916854ebdc9bed9c9e140000000d5f04fc96d295a997e914adfbfa09025573ee83a05a141fd20c052ce158bc74067d858dfaf2ca057fadcadd390b677c1c18ed12d37a0e4cad7ffcdd82e3281d3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2688 iexplore.exe 2688 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2704 2688 iexplore.exe 30 PID 2688 wrote to memory of 2704 2688 iexplore.exe 30 PID 2688 wrote to memory of 2704 2688 iexplore.exe 30 PID 2688 wrote to memory of 2704 2688 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d67fd93b0f680225eb5d388d5d6e0856_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5774ddaedce2095f1fadf7bbc939500ff
SHA1c80f727a02892affffa03191f20a4c388ae46ece
SHA2562dbf3ad82e5703286dfd01a3f3cf3e34d188246b58ca9a904dc6f56e44f54de9
SHA5120ea691a57cfaf1299fc55b8f7a68eeed96e4443501c7d21e598391bcc31ea8d14a847df0fff96e29ec7292036acd3c9f5823d4620eac6ec7693849fe5d605930
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5209661a394d36c39927c8ab11be6c16e
SHA17426f0c8c2bc7f32934cdc226ff5349801a8cde8
SHA2562fa83639439a413b82d0eb70248400766f141b042347fad57f77472ef73767a4
SHA5127d6ece2ec984c9dfb44cdbdfdd56d69637f34fa9295126d35a238d7d7998d766330ce4a5c209a72a81aea8015d05f3ac8826bd686c7e7d2ed6976a5d5472d66d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5968b1b49d8bfc64eca30bc6cb146353b
SHA14a29b93a1cead87b3ac1c8286206bc3b854c182f
SHA256c353f3f3f89c7dd557ceff03a754e3828bff961f2b3e7045da7f9b6df575d7db
SHA5126ea59eaec74c24b9c079da75c1e2e833a117587dffe5a181620e52b7b781ae2bbff5729b3d1f13c1ed6f8fe2e343e4ef1356525e1fa093476cc6786e64188b2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5096fbdbc0f2f61fa302e8a67095b38e4
SHA10cae50a19f03c8a4bf208a5845f60a56d803dfd1
SHA256aee4d7acc823a0bc054ddf0cada00f3faab3498d0218fb0cd2874f6557258aff
SHA512ea4615cd6b660083edc0cf6552e74d04c2c1f9cc496035ad74ae6d18151b2fe2c946c5c0d4ecf3c08f803dc159bb59ab8f9cf912c3fc2b474785d780556b04f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a3337b107b270d20933599669a26e23
SHA162c4a3b76b0bece2bdd3134d03ec7f81ff41f8ba
SHA2567b924be832fcbf59c1ca6181c29459a1e044b171a2cc397535a0b7e67ef9965a
SHA512908b36b165c5b9a876ffddc69657a338ce50102ec7aa81aefd001d79d33659a7a58830d88866c45b861cf4efddb786af3ef3e47bb60d41b93d07c46ff8e35e6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d946e5e9319a91297e3635fb7227f8ed
SHA17b13874398ffe1e930590f7ce768c16efb5ed880
SHA256dea2c6841c6ae689fa6c737fd2297a6bfdf030c4eceaefca74a42d0abddd8c81
SHA512e34e7f8b3796069f93a05d5b517ea6a128ccd1638d9f432959e2de3ef6ac5db6bafd3af1af7d99d9ade3c0cbda829b535dc02c53be35c0b4dcf292403a0b13ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53198115eaa635accbf22117eedc2a734
SHA135bec8f8da5bd0b112624e6398cb17102414e91e
SHA25665e1aececacd8bec3d43b1d9426330aef637844bf045d1b43f190a6b91d29b63
SHA512b504574417de931e94d0778ae9fa585bc1b95e443dc4e8dd0d133e09189019f7a3e56116c4f4bcddfd62e6812dc0b618b412ede1d01dc2d6488be552b1c2a118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a37761103308130b1f8e77468868160d
SHA10a1bd000956725aa04fbf3e51fb65aa3202471cc
SHA256f153fd8602fc36fb6e4da5fe764cdeee633bbf96571c7d4d0807be1612e42ef3
SHA512883752cbb74d7ddfcee45ada70edc828077c549c72d8661157f975fb63209fec106d91118feb9f63baf399bfe1126a30d97376e21c45599c6ecabbb208f7fd80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ae941ae4f6ff4b18ca081d81ef8c01a
SHA1275d58ee28093843a02543542f9ff751344f7670
SHA256cd8a6314ab55f1594c509551ea8d70651d0bd89c41faf9eb8ea314a288bfda97
SHA5120d6d3d5b4d282c2e8e962f04d9d45b1af88a5a2cde3170428ff413f315dda333a2eda4818488d716393f01bc7e8a189aac7a8c4f475d2d300152d0d85e452285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502dfa224c10059f63f06c1ff6235168e
SHA18dd47f5a68254dc6a4b94a61820b57e3a61d04b9
SHA25680d5a33777f6a872c77e51ce5fe65cec5bcd1d2301227265ccc832ebb4de6042
SHA51247aa432a4a986d879b105170831e5cbaa6429cd160a6ce77c2c9d17880e313869dcd673a20866b1d4cf54b622ce668b016e6b40a8bc56c53e425666e136a6b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdda8f39b952cb89363f518be7e661a7
SHA17dce91b89d85fc4f5e4a8f8cb58b59a0e676f0ff
SHA256f17ae7b37a727d515ee45bc171e7c425ea81049ac39ef27ec8de6f5114c9cfc3
SHA5127be56c2ddd9c14b26131cd218077a872cb158a5ac65fb83eaa66cb6204ff0162d42e6b39b0dca77de3e64ab2cb39f24e2090bd0fa3f00a1917ffc1d2c9df565d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eba5c1f1bc35479089c3c1db96a1ec6
SHA136956a07daecca319b555faa12c9e03b1fd59285
SHA2562e8e9a7980ce8839b5977f98bbaa54cc7d1bc4a3fdfa7213daf312014e33c744
SHA512bc4db0c97baf88c30b1486305dab52e4a11bdc5cbd8b33d719d1b1ff6de9a32b054f1bedf06f33578c09be9e3637f40c7fa72b94385ca558ac1ad41d088150da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f588ee0f37c8309c023f602f8a959433
SHA1fa53d6ddae69ba0b440052faffb2899b97efcf36
SHA256058136faf14e7bb1754e67816e96a52a425679afc92c26576dcc381cedf6b9a3
SHA5124d2fefb592dbd65e21e9ccab031d1052c1e4b3aa4c15ec5345a6dbc11c24bbac5a6094ee9eabdfd1c43d3a11738810b169eef9009164079651d57a3f09ea67f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58865455fd6ae7482d14d939ffed83566
SHA10bc2c7e67185efc7fedebdd321834f493a9e5f86
SHA25676452b0482469196c9c5101a1a345be3dbf8a8603993ece1f5efd22f4fdcc2e6
SHA51248c1e516d8acd487edc29d1c54a2bc22d5bd4e414982c4842f5c9e2ed31ce8abfe529567122f7b5c959ae53afa2d9c4bd631ff356a47475af0e05082acbc6e47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54190f0ff825c5070848fb6d981187a49
SHA1c66bc50b6356d87fb2d7ce572e454a2da4aa06b6
SHA256de437cccc82fa156f05e8c11b99bd22697f93be7e5e92bb67e3938ece0836e4b
SHA512d901d1342d70aac3b672f1382735bbc4dc1cdd5c3f4cf1a458494a8355ca893e9780109f9f88de2c6f191eb013fee9c78dbd67c7931fda611ac084d6844ba61d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532efe4e5815b7a5ee9d3a480851cf9aa
SHA1e7fc5e98ad4ed3e9a54e2530d7487e068dae9be4
SHA2560f6b8e59f81a8e47ad0e244b0ceec43ba4734f076e7b19a966aeb762277f7985
SHA512e593a3c2db5d0b8104c7e52757d0da3e34a1485cb64ce460cbf5c4a62f39ee0f680b3de822052145ecbccdd6c3fc3f57ca11d922abd5bd0c2f0e4594437d3853
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3a3b19adc7578158f4a6ffe5c763acf
SHA1f1559795ce041ba566183c20909e84a089d781b1
SHA2565b20d43ef9b78e51ce99743788dce6db92cac780bb484753aabba5b54943d038
SHA5125c13698be8e3416274e0ecbecbe99103e4b0fe5278fbffdd11d22a504016fa0e37322714ea7e0acd99ff31cec3a5604f4bb26a7260001ee6eabdf409b0a75f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580091c54d9f6fd067728a656c61d0976
SHA153e29efe77ffd174547ae55fbdd03101f69c1469
SHA256cc8557102ee859f79a37b70c48433a3cb6e30d493f7de7ab0fd2b3e602ae2db8
SHA512f266fba794c480b35c7d723601c6a6e8858f9a075cd39b57dd76017a983836e3201dafe32848436c65a40459ca9d28e95397a48a8185eab3c3c4f9bc3f1dd1c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a19c545a5a97f7e4bb638bb744fd27b
SHA160c083c7debe0f5dab840ccd7efd807e7182d862
SHA256d3908a4f74122bda881dd64aae97a8a7318d524deda3510d27847ce6ed133df6
SHA512f7f9d1ef445241a18085210e40c6fc2661ce475bf0d28b7c212d309d30fb951fdf638c9d4d03732e1e073c14f17a5c24bf537dfe26aadf44e11d094cfafc2097
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b