Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 19:44
Static task
static1
Behavioral task
behavioral1
Sample
f07a377ce0d56d5e61e26034c523a029_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f07a377ce0d56d5e61e26034c523a029_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f07a377ce0d56d5e61e26034c523a029_JaffaCakes118.html
-
Size
19KB
-
MD5
f07a377ce0d56d5e61e26034c523a029
-
SHA1
5f34a5c5969bc40f5644d7254471606316849e10
-
SHA256
68e7f8e3260e387f59c1f1b97fcfee9e91b2d3cb0b54ea5940c595e7d405ce30
-
SHA512
96e2ca2df89fd6a2f5278aaf1887993f4e15fef96b949327d39b87da5f40491837ac213c541eb41e0aee9020fa2ce6f0d9e9387d5a1e9e305249176182c3e6e5
-
SSDEEP
384:SguaqERfrXxs+vYJbb3v2MtphTD079UxP6mnR7JhZjAnPLbYL7xTd:SXXWfjqWYJbbzpTD2EdB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000606ffdaa4ba277d4ca3e6f892c3ee532d33906c916dfc065a0272e74df806447000000000e8000000002000020000000d002605df5b6c850da5271ab69ed8a62e16b14af479905c6fd57dbd0e2874c9790000000598616368f372f7deaad6681b28c0d90db991f67cc2e60ecd9386c1de9208b48ea83375ab31f3f2c7b34bc8d42b14315706a49e48f5d4e37c02b39a2d62478f2ebb658b05cb3cb337fc90ee3707d9f419d014dd830bf186b7ff3bfe2ce083cab43e5890913857a08f2cf1e9899406cfd072c4bd6a04fb8b4a253ae274ca92398d4a21b020f63c38fe0de62896516284e400000004e851f4e298e7f66a30420e18c15b063e4c37e4f89a29f585d06c486c98caa2e98b9519a78cdbd75178bbe4f9a8686ad6b79d8c99faba2ce5e47edfb94826fbb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0FF2D91-7851-11EF-B6DB-72E825B5BD5B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0b715c75e0cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000001d16f02fcf950d88f863b2119b4c609511fe14cfab9a83f6ccda3b9b255226c000000000e800000000200002000000091ad671099a9c8668f3374cacc8ce65644588d81896b27014d7529d76c105de920000000ae632ddf2f8b782744407ee7750b5ba2ba0657e9b67914a115fb3b3dd8d00a9340000000372258d83a2f759e0d9f8a581253fbd6d75b41f0840adeb174a1ca52412d25802441df0e008b42905eb1150fe39b8daa87cb2431e9c70680452626a41f99f597 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433109748" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2540 2052 iexplore.exe 28 PID 2052 wrote to memory of 2540 2052 iexplore.exe 28 PID 2052 wrote to memory of 2540 2052 iexplore.exe 28 PID 2052 wrote to memory of 2540 2052 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f07a377ce0d56d5e61e26034c523a029_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55787ada38560a5909e2ebc22c1ebd7e7
SHA173d58935cd239ff46f6e0301c378ac1599c99def
SHA256f083a2880b3901f2af831bba3d885723e8cc5ff2a84d3c293de4408714728b75
SHA51269691b0ad623ab914cba02917cd972d52c215d69d5dc8c5cb4ddfb0e2a7f02aa09539fe9d8050d6e0919f9f783ffa5f2d157888421f4c20fb219b443d301e24a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6bc909e71acd7ac79733619303bfb3e
SHA148ef7a184b85266cfe0314bd451db6f669f1e2ed
SHA256e0e12e7492010a352c960efc745574f868f4c3c00b036822757a8468592c6319
SHA512c1d61548dfa408733ee467ccfb20653f5c87d643124f8418b52348aa0e2e8ca6272c1c8dbc4bb953f65022c87add9fb1d25e68fbdbb13ef393a2f8a98beebffd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e28646d2717cdb39826081ed2d5edf62
SHA1bbd0b9c44ce3d8ce75f365269c8804a503b94800
SHA256b2752cd16993dc3a9324ff69e49392b1e401359c1a53fb99222f65607b049ac6
SHA512c46a3eafe070b6d978fad77575404f6e461ab2afa469ae76328083cc5c3fe801a95296b6b917780f88d10bf15ad969afb9a6a6b2b9716c7bf0c086a3b600a7c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aa1eaceff40d230c230890f73a3e5c2
SHA11404fdf6af040a4cb35c9b691e8ff2f0defc65d7
SHA256dabdb301f0a8b25a6771274500a23b8d5ab2f8ffcd339a9f6ba71cbf5b5582a4
SHA512abcbd3bd83fd2c1d445984c6311925416ba4cb0f350b2cb9ee1874fcf41392f8bc2753a75d9890959c6c8417d4c72f2ac54b81083673584168b3691c64117ee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5083f2da3387f29bfc5f2b5501e9fd6ef
SHA19ad243010349da1345c356254a3bc0bb032c281f
SHA256a571eb6038feb27e4bb34e08192e55c0d4a25eb4360de327774bb49a43f91dbb
SHA512953b46c3e388706923d2e87389f8628a82c0d05b22af45877598c2c68f3a2a8de5849e3d2e0d9ef2809350d30ad468fec54f0977b0b376f9195c8174a6ad7c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5544d924e0bf026499c34429e280ede08
SHA16dbb08d1ab2f2f84cbdc9a4422e2b288904c4562
SHA256153c4b6c10a36848e86b798fd751f942e5a35f63d4c4ab58330ded3c586a3850
SHA5120d32a0bc3e119009f37bef1ce25f604c1e6c4701b5025cd70a0c0c426b107ea8c3102dfd8081df6420a1f30b3c238a0368961208f659efc20220f541d4b1a1eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590dffda5e4cdb6e3f657af869024b3eb
SHA19d68bc09ef9c40cb6bf311f8b1830d9f22dd4e68
SHA2562aa997f86e7e2e4f01ccb18a7f7a7319781d6ae39b208eb71efe5d33aac176b7
SHA5129dad11e42981af5b7f4b7f494657058a039f8e9f144c0bb1dc97e19865878d5305489f6f345064bce06ad30a8e1c9374125861934155392a5fa30fcd92caf8b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589d7474690430e0c6e97ed233c58790d
SHA14ce5e723fc63c9dd5cd1eefdb4a770292e283cbe
SHA2568c7d58deed37d94badbca13c4828ad17f396081300c3ef3fc5cc29e98069a84e
SHA51211b46f8ebd510f2435ba6cfb07072209916f7298ba4629b8a842f26ea956dc2a9b7b5957e08f7a39705e0c107ad2e26d4285a7dd75d413df21e45b87d5a6a89e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cf6a2dc5d0f02b270d9e3e43c09d45a
SHA1815a1af7eac64bfcde7bc9a9130fb4f1ce41cbaf
SHA256b82a41ca190b6827b19c6e9d250bd765e47520fe67320b9304537e99c0ae6554
SHA5120dae46f57993ead21781528f4c14bc5ffc303816f239457dbbaaa1709da02a76e2cc6fdc9f1392d5da7db5343b04871e69546776c281b638a654924f7d996603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521c4bdabc3dd83eb909e24079ff25a15
SHA1b8fc8393e75e5f73b42a814e06462768fdebd46a
SHA256cdbecf67d619d0195fa493ca70c6d7a12a43d5b9bd1d708e4ef7748704f05ac7
SHA5125e02da536c994a93fca3e50dddf3d8430add937e1aff61a0b79460e42620a2ebc0e7ec1eceb00209d0f166fc9a975ebac076e9ef4ef01c30fdfb5abac1348a78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aa4461bf4ecc56ad74349ddec19af03
SHA148d9193245782ac3c4ab06324b627664167afcb4
SHA256874cfee3c08ba3c444422046d46ce4a9e1a1228eddedef9e0632865bc1a82a01
SHA51290b3906344fbd3081eefbbf0f43f105a3de53f71db0d4b3f1aedd309dfb997e16e3b8c2cd00a6c60597e83af1e139b46ac2ae34eed98cb603d855be9b843a2e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55014701ae8ec6a0c13ffc91988dc85d1
SHA13d4a762a7fe31e3ed368ad424e619a7884f70030
SHA256558d26d50164bbbecb39b13f38df690e382d7ada869556f9baa2e5e9fcb056fc
SHA512c97cf2ac125394b97fe557adcecbdda981cbaf3f9da2d2f958240949cc53a305c73b71e8e69eff90712ed489beceb0d9d8d579d5140760c53c12e5ffa311e34c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5779b18ff51a34019888f60161ff8e6
SHA1b9eb3b7a17ddd6b2805e03b5bbe53c9057a203a6
SHA2568b1073f87669564be8fcf2bd3c1f5aa2de78193673e5e7a62cd38c9f7a85f8d6
SHA51212f987afcdf2b3a6f62c19bd35aa7adbe3f6659145c83f634a0b1ec1519d2c0c0c41f50dbdcb6d545223dea042ce5c4e0b1074158dd1430a27f15dd476207f89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ce8fefc2deeef09e18bda5d86854b8c
SHA198e0d839c99785230cc8b014b4e6a425d7f751be
SHA2564d6f8617dbe64689b2f3a2be7ce25aaeef7fdcc1a9f67b13400ed67029df6bee
SHA512f34728cb47d2fdf6491e83a4582a3d1007b5108958f1d85be1b44a884018f268412dfd2f3669a031fec769eac9f2050cf420622ad1b964f6c61a54cf060a694a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5057c9d35a5ef6bf424ce45b237ce897e
SHA109b2cc05811dd2129ad04c3b24e05217113c0190
SHA256a6f78a49d5aa0d3ec696484228f46c125a4198da5db681fe41add9e4133bbd78
SHA512484f6b1b77f0cbe4d86dbe06ea0e1b7a860843b1ab547da7b986b4625a5b90928500078e402e96769aa56dbdb1e6ada20f55977ce567f8c17db411aa49631265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c82d13a46d1cc0cfef352df0afcd3ca
SHA134ba77bc26633e449108645ee0557dde04be56d3
SHA2564b384aec5fed9d9782f581e7296ee74d82ed2165546951467c405219f605a364
SHA51206e14f6177b22ef45e4e24a1827c6318ab9a5bfdcfe71a6dba8ade8020353beb92b5ae629b6dec02d014125531248745403d28beac0824093f11f004c9740c0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a00cebd768f56d1a077b1c55c196a35a
SHA1e26d380df4e0822f66d491927f4ea30ef3b67291
SHA256a0801b53e91375d69031f7ebb5dee73dcdc8c4624b89bda5b02fb291db39af84
SHA5127214844ee44c94f6fac08637d06690727c2ad7145578fe6c07228a5aa9b3a6765331fda8315332a96f9244ef01ec9091524b77174002b178ceda8f4abaafb448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539e200abbab1826c3546fba9fcca886b
SHA18868a54b6f2695ea3c34f342f86020cbb735039c
SHA256897a49091aab1855ea2ac66d334b0f0c50ef4a010f42795ce577c6e1f8438aab
SHA512eb6eb2bc306a1d2944190e146876f19627a80ee1083feaf95e4235589f4247e22c4ba5856238540d818865a7a44060871be9a9cbb8cf7d840b042cd50c1de2ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cb4427e1c9aaf589b5f343024e13e97
SHA18495f27b47d1b1d68397e4bc543b4bb193f446a1
SHA2562db531f538b18ff3b9b2bc839f229cff0c98d087484e3f4d4aa9bea8c431a88f
SHA5124b87d9ce8144e76cf504abf8cdf557dd757bed5b5023c800afe267ffd01c34f791540d56b7cdd50c1a01e81263018dd953da123d11917a4340cefd49c7fa5570
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b