Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 06:22
Static task
static1
Behavioral task
behavioral1
Sample
f5631c5b463cc517dade414a0c7eb249_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f5631c5b463cc517dade414a0c7eb249_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f5631c5b463cc517dade414a0c7eb249_JaffaCakes118.html
-
Size
69KB
-
MD5
f5631c5b463cc517dade414a0c7eb249
-
SHA1
c26d6e57388e71ca15d6997c1bc36635fa08fa78
-
SHA256
6684460eae704cb492bcc369ad5de91e43c53ce4c945f9448ff0e18b98d75fc4
-
SHA512
4f744fc212c348e9e195604a93ee9738a34f9d60bc6837826d411a8ae3640cd22bf0e1244b573f8787e3fd3b288aeb5dc0d66ec37dd9a7eaf60a15a541c6e1a7
-
SSDEEP
768:JizgcMWR3sI2PDDnd0g6sAzC0oTye1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFVG8o:JH7TvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000006db8de8351362e3b2a4aff78870a16770df04877bd99afe5d1c47ddb21fd350000000000e800000000200002000000037788c9f2e43252f9c4a774fc10609efcd4ec2a4f6f097bffdf8096f8e6cf56a200000003b0767c4541569dbd3d749e2b49c8861c1cafbf2f7d8fbfb0f5a2907a3a63f7140000000b60c538cf1bd8f570436d6dd3a4cfe51f07ec03c16d55949f588881db113edbb19a5b3b7888a396d694e454d541e9c7adc427087f53e55f1d8f7195167ac74a1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c05df650130fdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7AD58AD1-7B06-11EF-AC2A-E6BAD4272658} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433407191" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000004ba6b35b0b9a168cd000a372c068859129ba8d82947a97447bbec5f151612e5e000000000e8000000002000020000000323800710b7d43b06e501c9178034c821e6f0ed066b4cde90b2cfb33fee17887900000006ed15ae3ebcb4bfffc53ec2916916a13b0261eb3e6964478f65bf7674986618e7b6c524c997c3108b606b05dfabcb9ff61f2086e5c8607c32814bc8ad86f2e76c444bddc0b8f0701053013196d65a181a49a0232d2ab7ccb26443d19bb6a507835ca4c163aa5c88ce5e9c1ce10a4341d8d89b68ff3cafeae275dfd70041cae234e3315ae8c0572386236428ac5c5ef344000000046adc6cf2d572251e606db1679bba63983b36cc33ceba072e182290fc3d6550bf4e1264ad26f7523afc69a4d34357728e52f2d4c335e9d27c46b40473f1fd724 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2404 2192 iexplore.exe 30 PID 2192 wrote to memory of 2404 2192 iexplore.exe 30 PID 2192 wrote to memory of 2404 2192 iexplore.exe 30 PID 2192 wrote to memory of 2404 2192 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f5631c5b463cc517dade414a0c7eb249_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528d7f0f8b4e2c2a6b469b19daa88c937
SHA1d6565cebc2f1ccc167474f558e582bbe22fab2e3
SHA25696a41d1ec20a5bf2cac30fde47a2ee7be420121588d3c9e456d5a0b0c78ca3f2
SHA5124cbc4233cbea8a54afe474eea0a9648e0d689f7166525bdd2250deb801ce38ed583dd5bf1ee26b90b6d663c650d856f33d58b0416c8dc2f03236e0e5b165ae23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5334fb83cb647560262be1146f611152c
SHA1ef3c3d8e0797d97c8cfe685363a19ab4aa7a0440
SHA2568847f345b642a789d3b1f0c1126f0546e3e9fedc72fa0c9fb9afb6911790aec6
SHA51231a3fc0f09cbd2ef28b338223870ec5c0415c2cf40d33173ab3977612c6e64caf23686694d79d50db4080dc862433dc63004e54d303ce2db636f9ac0fa1ec4f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcaff17d969ad3d4cbc67e53c2c64679
SHA1887e9fc663e2d010af5840f6d15fc048f9ff92ac
SHA2560c151516b6048dc8a7b57b429603257772f53afb6c9ddd89ab5235b8293c5dc0
SHA51285a99a60f2bdcb85536d20befcbbe0324e48aff2586ba04dbe0cc9d1923d5b578cd91c1db768ba145ae5911180d622b1565a8d6c9719a46a39063c3f92b655d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebf2c4f359a471d05b0592b97d2b344e
SHA194b2328ce4d726be7763a8afb48a5a8b41ab7202
SHA256b99deb35e472a9b637be4c4fdee07d1471967dd24d5e28bd9a75d0fb3e25e814
SHA5123371d245b5f2816f5935e799ad4c3f5acaa5cd5bad42f08368481b568e9c3b479c967ebd215e65090e6465f84b13e74352982d862c0ea50d10c25a62cd36ba47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581ae343ccf52ec8d426b47f7c6b89925
SHA12d69d03dd4109dd68997fdc333fb4edf5f9d0432
SHA25668f27532ef1783b3513b076637c96887614099548bc9e24da1a37b786f66b3e5
SHA512dac59665010772e4ecdbf4ad34368cc7aee49ebe02f71c6f70016328b26c4f714b3914e0e6169949f1e100a6cb79a6c9bda8d25dd12f402e4c282d033ec0cda0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb698f4f05ec0a39321af02516e12d9b
SHA115ba9077825e9a7903bcc8aaf914531d12d50620
SHA256a39a06dea412e1f02eb4858515c8fd064e46cc722eb7299cca73a00df03d79be
SHA512fd54db604ad098af1b54742f2ea126e903a1eb8784f687a90d69cccd113743cf500fbaeda6d96afae7fe8b1d6f14d0b4fc68a1a260d902070275736b8b0cee24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e01493b0c0b6e727303f55ba604d0293
SHA1eae1f58805f9b32acc743b7a948d33cb96c0a119
SHA256d08946ab1b142961aa206fc40f1f9c53bfa88bd788c041eed04927d568d2052e
SHA5125b217dfb795e154c04eda4131dde78cf48a9cb17456e28fea3fc563411d7065187ff7b1fb0b18fee9cecb69670d21be0b1db1c93c208988c9448a42e83c3a44a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569f51a6de7cadd8c1ba47603dee4d372
SHA107c008537ed9b4005333fa9d26b38a57761def39
SHA256c40447a45ce8a7bd4812acfe34adc20ee8f46aaee2d81da0d544325740294356
SHA51268c3f19e4315acefaa8ab6a1ca911a715725b3952e400c168820e463a39d7664dae83c6e9616c0d98480a0ee36eb20de49620cab68199a1fe4793c15ff10b729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5203cc9aea7eeef2456f106c332bbecc7
SHA1f82bbbf872903dc3b8765b1d5d163bdc319b27d3
SHA256dea8cdced2a6f99c98482e736f290a18d195d897ed355035d78cf6f22a3ee449
SHA51257f604f3449ac38d10937a9e5b00657290dae34bc9ce492b67faec6b2bd31db2c6874de9f47894881764036fefe3d8db8b16a45bca1a30c72130561664f1b365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55731f790d03df0f104d71c932f281bf1
SHA1b0afcc15ea1dc33a98068f087f32980438aa3133
SHA256b331ca854872061514f13eefbf7e0a13a6541d48b66654c1882f8ee7cdbb9ca3
SHA512ebada8a61f592c45b5b57644e426f93c95e390529c30dff1fd14e81e4446d7bdf85d4f337c2dd9665c00790f345e70fc52a4bb8a04c37f666918325ea5d7ba07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ffaa6ef19c7ccd3e623759f86f62773
SHA17378da99ed8ae4506afef2f06fdc822238f85279
SHA25696c15f289679cda6eb242f313311cdf1b0950a8232b2f1c3782994d64041cd63
SHA512fcd0a65fb49783c131aff7ee0d12a65176a0abdcc1a84429fdca9ae5c93a637ef49b396511d1152b9cf81ade381ec80ece033d6c999d207b85e5beeb1365ead5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5865e410a60be6b184456d6142c92bec5
SHA12a6c45e90e252abfe01c799fc93887143364f893
SHA256441c7abccfe357337391038f67e6f609f7c29ab0821aaeff72b6942a601617e7
SHA51247a8dd5116904c79997acc022252c56762ea398685bdf5487f13f662220f514c360f28439bb12844b1feb4ff62b273e84688aa0035124d1090acc7cb3a0af4f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587a83726b48d161d5528dc6f2e641f2a
SHA1cf8cdd5d26848b9a45db7ccb20b9801770580d33
SHA2563dd17ab8469cbe3897a372ab7827f1a3a90f60f59037691c284b1dfd25375679
SHA512fe9137aeb03274776f1d6b5cb3e9ac2e0f98433ace2db0180e57916035c65e43de4a6a9de59cd1478a613c54b039764fdd71bd21139f4fcadbf6bd44e64a11b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de22d613fd7d5e00de6f9078bdf8a895
SHA18c9eb65d1f4acb5c366ad21cbddd42fefc5b1d3d
SHA256d048fac27b0ff4bbe27d3cdfbb1aded02afddb81c26691bb2c41665096fbbf2b
SHA5127e60840e9621fe3b828b60745f3503e13c1c6cd69783450427d76e870bd01346fd12fa0a2615b8a20c2cea87c5332155bd044b5cc042948294b6d59ee4e24ab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b7634d4bfed08ab50ddb33288e84076
SHA1f81088ce76a91085543b0f63b00b07bd75b5d57d
SHA2568ea6679a05851a613a9f07990552360d241ae45778dca85581a1de800fc954b8
SHA512da27d618dea47fa22937f7c3e506714b059d356da7fe4f3c64c12e90d0a2d983a2a7c5932494da5abff92359c30a96e709ee6bffcf73a5201cdf3e1a2428b96d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fee176c2d09cd48584fffb26fcc094a6
SHA14dd73176f36caf8d6e07d870befbbea0f1bf4365
SHA2569496fa160ade3ae253e433d43ca048946b9387ae51821d31bd1ca9638cff1918
SHA512409626c0dfd6b960e002e8d212b6985ad9a08254d66b2186dc6876950a7d330504301dd89cee4bd194b8a0f4ff607f68fd2b8431525988f660f4c37e55ab7609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5984db023014a6945b56db508d74c6d2d
SHA12905cf818312734e351944540f72c0ef4ad71c56
SHA256e29fdfc04c692353f7448f7824b9a8060ad9e321fcfdcb158879ec4ba9ebcb1d
SHA512b30fb96f5547e6a225e94a235f601ba645215ff317c07cae7758e1060decabb53b6d9867b9f20113a851dbaeaeae5ccd2ef9c1c5e8bf3ae0fb4fdf201e12f5a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fdf57a60fa5c9153be3392776b3bad7
SHA11e45f44c12a5868a06147266969a43a0c64c8e5b
SHA256108638e08f99eb4de4b382f9eb87421b948cdfb705613ee78014e0cc4f366129
SHA51245362a93602205d8f9d394476ed694687f2dce8fc803457c955d31112c81e952905c329a34fea32cecb296e7540538319e1ad3aa095286b6134a73f2dbe769e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c30b8fb5e18df05d7a22ca27efe9f080
SHA11aebd05d3fb2edfc199b9f142980d31a4e63ef7b
SHA256bcdd7ba5fa05a46f8f6e367565e5be863085d3b99f8cd66ffcd6faaf1bda8d31
SHA512420034aebbb867c3b6002be4c1dc64c1e63b4d00535f2d10cec303074bd34982ab098cf59b57644403ebfe972a38c284ac3e17e91d5e2d35330ba94fd04c3279
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b