Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 05:37
Static task
static1
Behavioral task
behavioral1
Sample
048cd5c38f7b95bb7dec01c78cd00c86_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
048cd5c38f7b95bb7dec01c78cd00c86_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
048cd5c38f7b95bb7dec01c78cd00c86_JaffaCakes118.html
-
Size
37KB
-
MD5
048cd5c38f7b95bb7dec01c78cd00c86
-
SHA1
ce08f5f7f15e6d2f42268214e5318f91103f0960
-
SHA256
d0142bb58c8340e3bbe2995c488c2990be6ef5dbc72ad9076df41ee6e4330a84
-
SHA512
2ebd57d0e2b001623516adab25001d02c313928a4b08b7ba2c808dee042904516f4e543f348eb7ee3cdba6c3ba917117bf0c5f7bab529ab012472c9cbbeb85d2
-
SSDEEP
192:Ghh/cikswh9Gr3crt3LyC8dSvnbPnn2TRs0SFjLLjCzjYSjhzj2GLj05K9hjRnjN:GhGvpuMwdhW0SfK9G0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433922936" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000b28e83e56a4c41d9f7a1eeb48a03692da787a516731cdec52e782ac8e8c881a9000000000e80000000020000200000003e23ef1f987e52b928cce28e490714d50b9f5cbe68c896588e029be70fcfce3720000000bdbe7a32f442be4ed0f65786a4ec668c23597ba25bef97579f256cf8f6ab63e7400000006788e0ca71c7f4732a2ce7cdc813556fd386e338f6fad6ada6877abf36e3299b859ce15e1a0568512600f8aae7afd7f83427f8c69bec1699d387abe0447fcbc0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000097e33dddf407ee496f18dadc9ce9b2301a28a319785b7248a62cc3791685e99f000000000e80000000020000200000002201f340d21b7acc8418f10704b38be45576b07d3c7fc2dbac7003c0bdee5d8f900000003492efe3eb30816ccef52429f398dce08a3ad13931c9e724e01b128185cc966e4b65d5fd936edae110f027904e2e3faf99345af0320cb93dcb373db72c28f6845bf13226dc08fb4e8a5787a0b6c5e92f8783d3eab65181e9dfc602b9578c6af5235645f88e0701aa140541c336edebd2a2ea0058e700d419461b1974b4cce90bd42f075d61439c190ea89d962538fc7a4000000045f939bd97dc199ad8e4d1ad60e3891acc71b6d8290d7cf875945bbc1333f2db2a379a6b41ce4203a313a2d44475c97234e726709dc9f8003cb97969e3d648b1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4041b23ac413db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B752D81-7FB7-11EF-A045-62CAC36041A9} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 540 iexplore.exe 540 iexplore.exe 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 540 wrote to memory of 2020 540 iexplore.exe 31 PID 540 wrote to memory of 2020 540 iexplore.exe 31 PID 540 wrote to memory of 2020 540 iexplore.exe 31 PID 540 wrote to memory of 2020 540 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\048cd5c38f7b95bb7dec01c78cd00c86_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:540 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585b82343ca3e48bd37b7e22133b3f2e2
SHA133bd854a3e2c09d7eefcf2e7ddfab07bfaa39691
SHA256766a9ac37994a9dd1a7ab935fb57b7eedbb0d2868b15a2c5280f2753c88fb1da
SHA512bfc464b88a65085dde233fadb6f523c98c0cb74e1aae3dd4706bd04fe464fb83a91e339c57141d7532818dcb036be0a9432468fd1960d9da0225b1758c3a289c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8d477a000c60cad7a5508176daf2038
SHA1f3b2031ebc86ac1d5bddb044f422789117d78abb
SHA256bbc62a617d49277d3ee8b81cee66fccac774294bc93873f70467b6252f18d68a
SHA5128a944a27c562c34f957285d08ffeadc7204c11869abe114c19aa506bdac6ccba3d969152bf6010db0bae41acff85649d597afe3706b3e8281a6e1fcf9ca20c8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6975c58cfd2877a3448bebc46abebed
SHA139373ddb903f26b8a3bc0a28a071d0fa1490bc68
SHA256bb83f3e7937c9ecf80b43a4efce7a081bff4ba5104b2618da0a112ea7d499ed6
SHA512ade42a421b66080db2c25c9b9e49a487df73c56f3ccfada4c31c7c6f86612a666e2ccec2dd3db7a757a61b62913a418dfc366152936dc122ee79028a4a6b2aa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6850026c587ec698ca5c9661dfccf63
SHA1eb2bd6bfbe4f85a078e41766da99aece1463511f
SHA256960b00f33b21bf3175c934eedf083d4590f80251df03105facae5cda1ba5c0e1
SHA5123926b5e983cb3a63bb57052a4dc887f49be3b3ca5174370bbd803e7db201065cc61e189f26b2880e943a1e7d27cfe85ffa1870601d292e771196b8579034b854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523bdcb82b006b7ac9c0bd041e1fdc91d
SHA1fe87faee644539ba7485e72df9ebf5bc877f412b
SHA256019ca5479c93eb0242eb63705c5be5deddab6c0b59855201b64f7e77dff089b3
SHA512cbdf80bae3c1a4f8075e5031d05d4f37d95a66f8b0753d50bb5a60fc7f54e127caf8c1bda4a6448e260031e6c93362ff336746e0720a85f0ec644ccb24ee288b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cb1effc8abb0a710db09dc79848201f
SHA1664fe41901a0b1fde5a41e0b51d3c5b8c89e9f8a
SHA2568f8beba9fa6ff73e309b80bc2834c379116889deb99632d59c58804a1dc7a1c5
SHA512bbab046cb559190887ebc4454c2d04f733b452b9a3d24a8dd1fd17b14453b76f6450c0bf8e69ef8659c8f46f240713269a626bebda35536fcc00279b8b9dd123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5646628cde014085bee2b3ccf9cffaa77
SHA1863d99374a1523f71b81b7fa3eb5982885116029
SHA2567fe66e4dbe2f3987a4adbae3cc105b7a7a966758bbd0b8444e4afff45fab7313
SHA512347b57a916f8d522aac13b2f1f7430bd9bfdfbc04f053e12b1366f79f20a411da2113ff7a34e6257b2519e26d96ae518eb4f39db15797db2b22547d0702ee6b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffdb94d8d8466758e59191d6a03a2d26
SHA128d9e5b5568f391882daad8ce8234d2bb2f271a0
SHA2565e5e6b9bb7b5effad207814719d873d5c1fd3d386123dca7925d38779dfe8f4a
SHA5120bb948f7c09c5c565c6050e6d478ee4f035c9e27fcbd73b99fed14922446d89f6f0d8e5f544b73cbccf94ecaeab727e5599409b297213702556f985136d868c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ffe566d4a47295bf17199fd162f1192
SHA1bdf028d3cddc008e3a2676d72d2e446a85baf57f
SHA256a75d0d32476deaeff68b72e104466f06296b3564f21cf1dab59efa19ea33d4d9
SHA51254dd6718577a81b127e3aa9360685f8e334e092bab58a6bde1cf871188bfc3821e59597ce1e088cd0ffe7e59e2d80ce12240dceaf27b2678393b2fa5a29e225c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5470a1f4f26141b4a76b6a5242e2a8a27
SHA10f67e45153c5e18cc5c6b1c693173f700abb6c5d
SHA256cabcd907191ee68ca93775c659bef81ca6d1f2dd01b4443d543dfc611687c6b0
SHA512d476ea94893e4c9a7fa7058f6ec9e06bc805a502d9d1ded50c703b09cb29b8e62ba85f70f2d1fb2e33ea869b583247f66ce0534a9d9354b04d8dfcb3f6424802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e95033f844c749d1fdfb75d073f67a41
SHA1abbcbd99822a0230893aa0b5f1a534a168524115
SHA256181932b6ed8e1ffca7573e4a6ca77c981d2cb2a3d5cecbdd3f5d5a174077cab8
SHA512a4bcd360032c68adc61c4d4a4a31d9f907e1d1d00338afc26edc1942baa8cb03d973da642e3ef9758f7cb86dd7e24dc4af2f6e21f0a9ca455450f259826a3e44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c61cab2374e804a8363724a043a8dcc4
SHA102084b36817596d7315e4290bfff6f7bcea8bfe0
SHA2567ec22c6a8cbeefd638c335ac015f936507a83715f2e041f85ef077ec997d8aeb
SHA51223d063c3af377be3fb9a58e1c4b2e1f63361f5ecdcd8bc55ddbff95d25db5460a4f8f5e90d990384e8a6a127fe7b2b8c3736fca8faa0adffe3855818ca7fba85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dddf3bb62853b88fb8c6d96287c2b91c
SHA143d05bcd1d4bf3ed0e43f2cfe4d3f90e90997265
SHA256348eeffa2a29c83340543ad1dd636ae339295c26c54955600e481520b3f630c8
SHA51268e1cb16414682ed5e74965da1b49a7d355e317cddf4cb7173840afce0098a7ecb32dc7c5aac69bd8885b9d5180f5c2ffab887657540fb84a5f5f6ebf8e2a914
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bc50915c2be214f0eb37bd651c63203
SHA1bfe2b75b9bb22d823d862c9928bdf5798b99e88d
SHA25663777d2e8bc1d0eb54f7a5785f4162db35610baafbf37c876a6f92794f3f8231
SHA51291cbbf9da1d0996c4b36b6095754cbc8c8fd857564b6e1963ece0b1233bb1aa6e3366d45ed3304853e492a9d0ae090ed571fd69f460a63cd70fa4d8489500b1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528c27e5d083df8a0c7d5e05c9c070227
SHA147b31510df8ca1a553f0331054df697bdc1fa650
SHA256f5c4bb8db30d265dbf86e702d4758ddc1497d2500a0fba5f6d75e5e056203a70
SHA51201f727fdcb60e83c1366560a9e99f4fa5d87960cd055a6fd62ea6f30dfebb9c235f905530b03b204f0800b1f9a62a4bc257f20770088d44dd5f5e1385b029b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528fafbc4e0a20e6326f53e6257ea852f
SHA117961e905b2ccc2e171d23bb035e9d11541ed129
SHA256e6a3a027545fda59d1d7e093ba2554104eb7f09cb854e939638b652b07d4826d
SHA512485fa209a77db2bd579575e151448afc5e128862e076d2be8d20be0efb5940f0ae96f60b18b4b675e91614f544f39c1ca3690ba5cdebb714de9adb0291b65160
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f2fb7ed33b3285fa11371acadb9b472
SHA1c610a0ab0a95dd1671cda0ab370bbb3e33fa8be4
SHA256a3b49c24b0ee476bfc66a0393669d307ac8ea22d7615cf6b6f10201010f3778c
SHA512777af4bee9534965fb096f5776aefd0e0af8eed63c249a9d3e855c751e09e3b178430d69d075d263fe53405ad01507cd167a5693a7df1a2ff8378f1daad884d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f63505b0bc36a801c356f60e0a1321ad
SHA1482d6b853d7b432cca1a680f071e5751dd58cf3a
SHA256f393d4af776a19cf07bf9be41f643cc83146f6206d21c664131b16c3f988a764
SHA512b4721ee449a56906c5ef2b5c3d6d0fbec5082ac4be44f7663905d7b9c529c155858699680dfe8f17c7a7233bdbf6a4c85a6c6cb634e753e717155ba17c94e69a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54360d193fc0b2c73bab4fbccd91e6763
SHA1a42c56492e22c4afd5bd39b9f8044da8699928a6
SHA2560c2a268aaf619af9cf2a82485fa28248c3d3a2e4dfb8aadb9e766a0ef230912a
SHA5128b5de60249a8ce93d57a484dbd9c6f98c4f946a2ef80eadcca61a7c2b040320e849aa2a023179c8392dd492e10071dcf25e61a2e916d1df3a80333a032307b26
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b