Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 20:59 UTC
Static task
static1
Behavioral task
behavioral1
Sample
f451064f618ef3766d97e84b54faab80_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f451064f618ef3766d97e84b54faab80_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f451064f618ef3766d97e84b54faab80_JaffaCakes118.html
-
Size
25KB
-
MD5
f451064f618ef3766d97e84b54faab80
-
SHA1
8402677e847b64644ae50851e030a7244d766a5c
-
SHA256
3836df83be54eeed683cd8968bccadc57c38fa445de8690f94e1083d4054f93d
-
SHA512
9b6eb7caebeb93c209ae8d6d8493fccd4c730654fc9a48a654fe61e82ed9661fad338f8c3263284196de7c86b8bb0c39e388bb74889c04caa8814f79177026c3
-
SSDEEP
384:anA4ywBpp42dBztvukeKXXTu9wK6boAOirLIWQQ/U4cR1LeeIYECdG55LkuxOk7X:y13RtWkek+ZDq1k90t
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419463069" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009d182698a4727943a65bc6c9ecfd0fc50000000002000000000010660000000100002000000004d297a0f6fde4b4ff9fd52777f18b39520935fac85920771cb3a513da3980c1000000000e80000000020000200000008246a66e5a54ff3dbf2dda393892ed2164d4fc1d7e2ba27ab0ca96230a0fcb9220000000bc49737afd0648e36a038af9d95cb8558b984aef72f56e383c5c446437945dc440000000983043eadb367e1e26c80331029ab7f3951df1984d6c35148de7e2bc7282aaa3c4be49921f406896dc7ae9954cdddfeb4b1d406646c901563f1c159bcad6ab62 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009d182698a4727943a65bc6c9ecfd0fc500000000020000000000106600000001000020000000cb57359b425616b785e157248b26648d50b24c9ea689debef6fcf2387a00d150000000000e80000000020000200000001844d2f316fca1af15de623484541ac2bc082efc9eb0f2fb4a28cee32bd1504690000000f367c4075ca896439bdef3f5c0451302500ef8cab7065fe357b507ab87aab89377c8b71a0b4f3139369e1fb44b9e84e4a60acfcf97c019050c3a32b3f7e52676556f8bd3d82fbf9509f9896833424ee5c8ec686552cc247cba199f26a38713e6b354aecdc02625baa1e7bfd5d0669a740f611c533bf2602d259b57116b8251e0019e5885695c34133a2491baf43bf72b40000000820a1751fa8028fa7f32c1b573771d0ce7950e803708b48442cf06d1b927048f34cbeb7b799fe8833f21223f24cb4b21f575ff0a66a515b5d04c52c640f578eb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0c4921e4190da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{49CEE1D1-FC34-11EE-B215-7EEA931DE775} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE 1884 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 1884 2196 iexplore.exe 28 PID 2196 wrote to memory of 1884 2196 iexplore.exe 28 PID 2196 wrote to memory of 1884 2196 iexplore.exe 28 PID 2196 wrote to memory of 1884 2196 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f451064f618ef3766d97e84b54faab80_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd65b16c5050893b9b62d36767920947
SHA180ba801faac74786dc16598ddb94ba874a1e76da
SHA25694e7601d0a5f543b633d23907a1a9b875fbc5aff107f389f8d1edcf3dfc62ad5
SHA5125fc33cf89ecd9333089fb6960e3c0580f48d8a5e84eb00679510c8253f4f09d8dd539d45f157bff5adf6975c3a49516d3400091adcb29d43aed562a126960ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1bdc374321ba9f56909b4b8168ae749
SHA1047f1bec2e56456a0f6609812ae110a12b4bda08
SHA25630d37173bfc604b5cb52fd02ad18fd92cc7b7c64e9d079a6c9bf5d56c3a4eab1
SHA512f9b418654ecffcdc74629d3b955b814c86b008ef78b612cf39148d2be2cfc92a13275ca30f24240d1b0981653741b583cc9fa5e662afa248e92ea57e0d793db0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f2f71d95a1f1f872947ec871dd6e756
SHA1eb5e1fe21c40048647b518eb7b4d5a99fe72a2d8
SHA256a116c8de39e04bb1b2b34a8adf68437382c084aa841206553ad98ab57a4216aa
SHA512877e6e931a829a1223e9095bc59cdea26173404bc6d6163f505fd27341867062be52d2cfd19d3eb622427223a86fceca4c6c4b0d7e499d8dbc10797514874ddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5892df15735f11047cc22bc8e24abca22
SHA1b4849fc03cfd5d75721384add344dbb4ada01c51
SHA25614eadd6883e50ede4fbf7dd950ac5eed3b4f6013480cd6cb963e561829d85801
SHA512ab0dcb80379d379ab1dcc6547d22f7cbec4ecaa5ff83773b8812844b9f77e15659459a1c193f7e3392492ca03e3b38cc5bd9d2e4d51465188c30c530dbdc0482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596cc090b62d880964186c55d847609f1
SHA11884682827e4dde66b2bd61e62d2f8387fe070dd
SHA25624464131033cc768e36a4fef19675408cf3b87700d94d6da6632d28f3c2a7c72
SHA512a211e1719daa58c6da6fd5fdcdcb059c650215857c595ae7f8da91171df755512958ffe3c30064c356a80e727f455c5cf052e6850426b8dbfb8e96cf2cf29482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5befdc89808796c9cb012b0e6b00ee1e3
SHA1166784cbeb0da5833f497ccc3af2f9ab7a6352ba
SHA25670630266eb2820faa19f353b8f1def1cca16f70a6d4bdd4841623d3eaca34263
SHA5125a56ef9a4b6fdb41751bd666a23085c74b60ee452bb95c0c94fae5a950fc477444b16a6d31c2c48a8f68a4ea5ce25180ab3a94d273bd2079d5f892c355d78bd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbb4f645851beb414ade98df61bfa2e1
SHA123022fd7fa954589672bedcd534eebd0b06d8aa7
SHA2566b871db42e1a16dfb6f1067947134cd269a3997fc84f1bff1895d8e28959d6f4
SHA5120a304d5094698c77522dfc243760ee6a53a4b385d653b75632bdb34a34a299ff0802d763f6cff2b66e681ccaee72acfc03ee4f12325e61e1b5225c810b7bb97e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5e8de6b34336c79920a07ff4f8b5f94
SHA1accfbf5c05a52df4a4ae8f9ca3bbcacb82e2e8fa
SHA256495f4781e705174cfadb3b49edb021d0d7ff1fb452cf5acb4c6bc099fcddef16
SHA512e891b575d1b5fc293881968b1407f4a955d5391e1eaf571e7b3062fca22d8cfc0185805163204cd55928c7bc0a50a718654a0b4669f7a99cc0c08d1d172f3579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e70f11f31ea1a29d048687c8fee28c7
SHA11acf4f944ffac1cbca2a0719a6b48381d62ab1a4
SHA256f84a3ab8a61e0893670d157bd9d1357c43066293ce338991ef1f38b5b184f66f
SHA512e86e397695c9fd35b147fe3e2a7b696c0280959c9bf55dd59fec0a24ec3da657ef4c21e9878045729545eca887ad441f8c33bb6fcad840f2514c3f61a617b830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb9a5f1b030a3e2c91e6dd4305a1931a
SHA1266420720fc37ac2c4f627b91b219aed0df870b4
SHA256ce0aa6bd926c7fc271b892b7d326c62acc7e782811a3771b3489f1ff89935891
SHA51234079666c52b467806de7ae3dcc286a707e9214bf1eb992e39ebc0ee0f8a942a00e19ba46100895212b6bf2bd54b39c693df11fdf61fc30987327c2b9f22d920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550bffcecbe8964229fb4df07a7292224
SHA15fbd17137eee04109c0dc3f4c7a2ad1325262b81
SHA256bdb5c0efb3b9f3a4cdfe38f61eff30a97960c26bec7df71dad3af52213406f7b
SHA512ed716f240784e2105f786fc86fc9a16d7d77c9d739d29c532e7f6278e02b9df3021eb011b550518111b1d847fe41efe6c6e98495d9abfde8c4969012a6e7aa9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e59d6588fc730a55bf089664f275eca
SHA13fea2d626dda1054e8bd45a3e451fd9ae2744864
SHA25639c88b7084f6bc85fd1d7b008fd014416183f6e9c8fbdaf2a3c764f05c6336f3
SHA51263e942aeda68349ef9f92e2047d036aa086be6974dbb2f1de1b6180debfde6873ca0bdd11603b64ab5b8a860be37d16a9c1a16d74091afe5f59e83fdc600175f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e63786bf2f94b215ca678e2f06c84d78
SHA1dcf79a18a0e7539c93ede3c3ee0552489c349919
SHA256c4a17a7300514c5f657764de45d4fd6902bcade8c09135a4080837e6b8ca9324
SHA5121134ac0c66087e48d9fef5c06db80a618cfef59a2852f4be9748acf06d2f1f50b8ee5fd155aad526f705b08c59dd580780da11dfa0d53d2aa24ced925a80b90d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1df58542292e5f838e551f287a807ca
SHA15844c71f3d038f7c6048ebaeee9156abc55e8d57
SHA25631ff543698db874ed9db940efe261f14de13c24f2e4274131642ece19a907d3f
SHA5126f9025c8e4961d494dab8e5406302804fe4c2a2c992500e0a338d966463a5391f87cce13b2c4771f7099e4a5774e943a288f0630883544b77bca09101bed9bef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e676fe6f22caf54194d59c4b8f826e1
SHA16d95f6451721f0deb12b20eac1ffbedf851f3c0d
SHA2568fb5218cb0a8f7e24cc8861b57987295b1176012344ac2b0e00cd7d1edc98e2c
SHA512b3cf8cc5bdc8cf139e79b6bdb391a9748e1b667f2ad907661d7a1054d51439ad1cefcbda4c0e4bdce257b9c5f482920dcb7eab4a0d2b030c9a56fde5963d25f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593b97dbf7c7df24b42309632f664ce7e
SHA19031ad164e52a6857c531cb04a69189a2233fd86
SHA256110c665b0c76b71a6466dfcba51583d35f313f3fa5821f4c46d08cd023603058
SHA512bb265bd9a88dae4fd6653f367691f27885485aacacb764f15b951c4fdecc6c1a7b6eb57202c64a886b320f1b3fbe889d01ed43cfc3ce13fa126ba8d9220ca649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be21bbe8b835c9ce62c59e1a9414fa50
SHA181c0f35fdcfe485dd1a5a51b2fe3753e5beda7df
SHA256bf0d3cfe8a0c6a66fbeb226850be3b677d8fb7dbce0eed2ad25aa4567e8138cd
SHA512d4a95edd86a5f15268f065c42deaea00021c5e08c660a9100f309b2a4157fe7c34f41282581af312acffe8b3ba22ed34f344b71b4d0e6cfd402e4ac448978a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56db4ab93565cee9653cce0ef6a84a14f
SHA114ab2fa281b2d685cd89710b7230094e7625f08f
SHA256aa411f80eb207f179ea0037585b2a5f103fb5e2c924ddcdb03cbc5ba2e49436c
SHA512b319cd1c2e4768af52e27c33f312db8f48321f6e125cd694b0fbc7f0ec133b35ed61485da2bd3ea15d70c96f141fad419c1d4d113e76c5c31991ed2976cef8cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c9fbd368ac508238b4b0ff10baaa242
SHA16fa99bc8a21f8a632c471596e6b017991ff90aa7
SHA25637139acfdb4703d2fbac47e78e265b1ce35daa8e547def87dec30b927a33a351
SHA512d83d168fd6d775166118a0cd2621cc831251afa461c3ee03b6ffad7fed0191ab7957bf807d7d8abcb3fcb7584c5d667cc41b256d65c6814b84ec5e44450b8db1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a