Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 09:23
Static task
static1
Behavioral task
behavioral1
Sample
Cool.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Cool.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
程序太平洋dapha.net.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
程序太平洋dapha.net.exe
Resource
win10v2004-20231222-en
General
-
Target
程序太平洋dapha.net.exe
-
Size
24KB
-
MD5
a2b0dd7a490c19aca773579858a8d460
-
SHA1
e39a91ebfddfe0bfa34147eb976a53c013cd39e9
-
SHA256
9e39a64ddf585f6ace211eb5cdbf43318faee82429479390eb6cb900c53caf6e
-
SHA512
9f74a23472f215ee6305cbad95cd39cdc617f0ee4fdfd29e95774fd5934eca8030aa288670ba8a6bf2c5bcd28885d27138b8752f07fdaff62349165c5fcec7e7
-
SSDEEP
96:/lx8Q/KUtRmNuOtJyg4DAfNBmVwq4ehCGsHDhRaeZXSKJEHOtJyg4DAfJtRmN:/TX/bmBKDArQwq3h2CIEuKDAJm
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4BF1F511-A8D3-11EE-B9E8-EE9A2FAC8CC3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb80000000002000000000010660000000100002000000040383f4911d2405c320fb002a96dcb1bda885510f7f8913a20efc5da0a506a9f000000000e8000000002000020000000ca538dd7b5a0fcfa743666fb736960346e69e7a341e086ce5e8b3218612b426090000000a45fa4a942284becd91c5444dcd28c656dea6fc1ce1cf9d28073ef4b3c2700fe19ebf19e2e4fa81c4262b254e10b34d6d37ef8fd36e10e5e5e430c04d4cc26709d47779b7444aad0eca2ded93c506e76a7b35bac813442c3545088eaac27f4810e9e8180bfe401bfc5aa009a69e9a6f76ee5abfbe9a3f748cdee51aa4a60155981f5d79b6747f9a6a1d62e8e67f7f5f84000000008b8d2e802e7b940fce1368d663f4420f6ece0135710cf0096b2c40a5a88f63159be4273e7d0468c36fb228f19e4ee3575161b92d912bda2022eab5c58ba98a4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410295486" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20b45221e03cda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d80bef292bee784c8e3c940d61fdfeb8000000000200000000001066000000010000200000009fb9dcecdc9941582db2bc4174ca51a49d9e10dc08f26b37baebb89debcba7ca000000000e80000000020000200000006dfcd765d078998f28e26bc83645475aa557cb8438cdd2df1970d29d1add7b5b20000000f87cb61fb6e35b2689d8918e12bfd92d8c412aff4ce14e88629a856ca2fe67cd40000000eec382042554aa4a57d5f18733957fa47525ec994bf59f4860361e8e40f3e888166a48ad4dedecd57c1dadba80a1ce0c02d2a746e53b859c81586e304c82d6bc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2252 程序太平洋dapha.net.exe 2168 iexplore.exe 2168 iexplore.exe 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2252 wrote to memory of 1744 2252 程序太平洋dapha.net.exe 28 PID 2252 wrote to memory of 1744 2252 程序太平洋dapha.net.exe 28 PID 2252 wrote to memory of 1744 2252 程序太平洋dapha.net.exe 28 PID 2252 wrote to memory of 1744 2252 程序太平洋dapha.net.exe 28 PID 2220 wrote to memory of 2168 2220 explorer.exe 30 PID 2220 wrote to memory of 2168 2220 explorer.exe 30 PID 2220 wrote to memory of 2168 2220 explorer.exe 30 PID 2168 wrote to memory of 2452 2168 iexplore.exe 31 PID 2168 wrote to memory of 2452 2168 iexplore.exe 31 PID 2168 wrote to memory of 2452 2168 iexplore.exe 31 PID 2168 wrote to memory of 2452 2168 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\程序太平洋dapha.net.exe"C:\Users\Admin\AppData\Local\Temp\程序太平洋dapha.net.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe http://www.dapha.net/vb2⤵PID:1744
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.dapha.net/vb2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2452
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55dfa1e37dd1a4338f5baa7876bc56997
SHA195ef46875a77069fa657034983b45e62ee7d77c8
SHA256ac18dc0ea3bfd5ab4c08f3684252d66f795e4df0f3d32251851af68edde36536
SHA5122172cdffb626cd75412538be609fdcdf75ba9a816848749fb4eb0d60c25d118230a33909b8987462ac7e0ae5a3b80ea71850de0416383ea9cea17cb214c74679
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f259ed51309eb1bad02ea87041b24cca
SHA11dca545f85f0a7a3f83bb2ab2cf9cceb88a6503a
SHA256f10aa6d08bfd3c5cc4b5d7379da9c34dab3da1eac131658daef5827022b79bc7
SHA5123f313c40950c632a99fe3b70fd1c9be8f4097517fc6a6555897bf0b016b12d96d38439246e268d3f23f8e745c0a19c7022a0ad140579e0964a1f2ff7985934a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a42e3aee18151de7de1fdf7bd1dbe8f4
SHA1e0a6f88057a3096883ebbbe0b22c353d66b967da
SHA256182390e03f57d1e385d59ceec1a22a544ad8ee33d108d0ed0283a31fea254997
SHA51213e9cde3f12e9d0b24714c731203e281185331c5ee8aba3d36c15a1577a3a68f304a8813a20a96a157f01cd2e4b129f31af18da2edfb260ec3f1f72268551809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e278435c92bd2b50d341ac4b753f693
SHA153afdf17dff4c07bc2f212905d10f13af311e952
SHA256faf044b72ead107fa751447bded9ce25caa2f44b2658f20c8601aae366e12864
SHA51200a3d822467d796333066fb938bd402ce11131c39e5ff70c691b4b9052adacd695354abb25bec2b55265b33c15b5a7730d2d82c6359b84f8ad997ca7d396614f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5256326e81c80c4b8352f0004170a2e36
SHA1dae449692ab47b9ea44278f16a833d847fef239d
SHA2568e9cd54e0a7fba7d82a2894a476223da17b777be565c43c1845b9021b63faa93
SHA51218011c5687f3f4e3ce2b12d906447cf3c7ffbf4573351d064fcb5953a10e227ed5f2365f821d22017a8dd91f45f03b2112a89483d0f62b5d5a3cb3488458aabe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517cff28c48e07e06c368ba92e9ef8004
SHA141def8c12e584e557ce50b8e32dce8188fd562a4
SHA256e95637580dd2952fff21d392c35a9a01a890ce42747db66c687480c66c9740a2
SHA512554e171a00293cc7c1b3225baaa741abd41d33bcecd865b12e9ce48204a7c7956e335e70a92281dd6115b868d6a55e1207efadc04295fd98a1cf2096ea3d2c44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3a9fc77a6dcfc70d13c3a7339547ef2
SHA1f6359d57a05eb34024446eb1185f2676e38fe313
SHA25643a6d53aedf9d82fe3a70b714c02a61e490d66fb0587e0950d8fbc845908eea6
SHA512884cf9e4e9a37e5235541e3421764af1bc171d57e4e9afd9fa503b68d4a0535f4af91af4a1c7e4b6a137e960c2de6c44912c8cbca5fc780d12fe224d752da4ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527effa50860145f116203c159d142c2a
SHA12e277c6252a8279235ddcfefc1987fce2f4dfdb1
SHA256796ca5f2a59691cfef17cbbc9941a39e55c7531a3706c8e5daf113b32d774ce5
SHA512a74a66f0c17c1bca27f70daa595efc3b0322129a2c994fdeccf0ea641ccb8dc675d1a0af39edd08121ddcbea8de1a42fe3fa5919cb275d9695b33260c446a95b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59891c71e5b2d28ce64e59fd010e078f5
SHA1ce70d235b8dfa47d9d6156c761da612ceb7c9bf7
SHA256185a9b1849b1920efe9163fe603c5c2b9006fe5125c37b6a9b0d09ecbe0a22e5
SHA5121cb8e3551c24c8e12a5000bc42c83f685589203f0140378eda350180a0851740f9536d4cd71424644514dacf2dc8c4abde415e1d808c68728fa97562c186abab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5604ba03815f5e80cb133202dab00320b
SHA1c7cb34c7cc7d698e46f3f961b038bdab35e03bae
SHA256faaf5fda643f81e7e9eccfad02b8e80ccabecf04c1d8f6237daf68a971d2fb33
SHA512605df06b59138a4d07cddc8660215bcfd0e4a24b40d7254d854e597742e90858f065f5ee100dde00c3ad784aee0af1f86a90b529c89cf9704174e26f724b5d0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532c9cc6e6f223c02d1025dcbd587ac8b
SHA1dd43613fe54bc91d346d4ef3855fb9697d9435c3
SHA256f06afff2e721a392404ca811f855d37dac4b27f23cdbf8c54f045e1b59e82b37
SHA5124861308740f46b839dd708d03dc878436c637cdec997291f99a0fa8f5b4e2c47dfef3e03dadb4267ca08c1abcaf508aad2dfd47913c96066702a5cb9cea8d7d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9b939e5c0f6eefc5bd6177782863427
SHA19df51869857d2b89f21c14a0e490d0b16c8b6c42
SHA256d444bf883745b2384da9fb1417d7cdb12ff545915395ee9a89af40278f78f3aa
SHA51293a8113c4a7236f486f8762e8081c1fafc2d4c4104ef36aeeff762c14c443835154c867d6d28d9c14288bb8577c363a9446050432c022395c9f2180673379d58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5224c4195ca3504922c3c225899a13f7e
SHA136e6ada934c12b4410d313132d72b9ca4e6ae9d8
SHA256369c1c0c9339639eb0a40cc335e6f18d2e801071035a205e6c33cd1e53251751
SHA51235d19b1a5b6bc9fb75687d8460a562d0189417d294f7719287241b09425b12e10c05f86842eddd4f61e4bfd7ca12cbee8b95f4d0171594857fa8a4cdb4c6acab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a06d92547ab274fad5c66ae1a05d6381
SHA155d0481fbcbd6d05f2578465bafdcd31f878d00b
SHA256684e9215cbd2a574933c5036857ababa5eb4ca3bc945b9c308da79ed7f47186f
SHA5124d4b703af2b278352e59e28b8c7c2277dd03e5ad3ab30f9428f1395fc3906afadbcd006dcc1839e16a64b6cb94297e4598f99cf1b72ca9ed98ccb6323929489a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca81d5d82f504f299a480110d46accdb
SHA1d307b80e228d4acdac65fed96305c3a4be3b0e87
SHA2564bbe177a2706273057009e50c057db33c4fdfad9f06e0040d9eed0968816057a
SHA512104741a0285bdc8734442c3b31ebf229eda18857a829254289b66af04a18713a960102dd90d0d580f4f9d231a4621ff406af565b8453f55339c32fa4592c69cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdf2538709a1385c127bab2dd93f029d
SHA18d853604c8d61a240633e398de73ec7d6e40fdae
SHA2567ea29b550a0ec9d20a69dba5cc1c8624b89e6191096c66c6b776db112b7cc4b0
SHA512ce8783e57c0687e9187c7fe0a355279dd25884a499545fe90ec99831b43a6ed9e19a95a79754e12976e2eee8aaa866f65f5454b93911c5666638574fae900b29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55084a159408d81059448122d41d51f0b
SHA14805def2c6ce423e8691c804a10b2b8a6151a4c7
SHA256db03951a21227de5e7e99c437f4cd2c84ccea6b8ba397b6d88ef73ff5ce80c38
SHA512c1dab1594152331b8a276bf30c34a21ed6cb1d4bd6364e2606c710d50d505ae914f8773cb8b67c09f1b075b921e055078fd4baefc18b9622133e92ff23fe1b55
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06