Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 02:58
Static task
static1
Behavioral task
behavioral1
Sample
15abf9795d93c5629f29eb4e7f43451f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
15abf9795d93c5629f29eb4e7f43451f_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
15abf9795d93c5629f29eb4e7f43451f_JaffaCakes118.html
-
Size
460KB
-
MD5
15abf9795d93c5629f29eb4e7f43451f
-
SHA1
16be38b41c88a3b5a8a4cbed43f007208decb22e
-
SHA256
91e1744354ca5cbeb47be4d3fbe254bd53d12933a075285438b293cae230072c
-
SHA512
e56d09d0ce98c195ed470f159cf1fc869d203edd45f0c43df646df376507b1be4b03a8d9af6bb8b1ba964766210e538cd73df39ecb55b44a97ff78ad1eeb3bbc
-
SSDEEP
6144:SosMYod+X3oI+YasMYod+X3oI+YgsMYod+X3oI+YLsMYod+X3oI+YQ:/5d+X365d+X3o5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421040550" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000f9f7a90ae1739d415a55193c8f466d2bad282320293f1d2dccda7c3348a650c5000000000e8000000002000020000000da40ed38779a6939ef0348d1a5703387ee77d4a1babdcbca3e5c6ae3c450e4c620000000c296fa1830123c6f15dd556484427cc1e30822e3aa6782a96937316090f661d940000000e6c3c6a38483dd22b077e9dc2ff03467a9802e3712636e296e7dbc47b8d14973e659a5a111d376441b5e92f0dc3c9d9eb434ee7e64ebed1cad8e536a1727c927 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000bdf0dcb19667174b006fa639e55023b6e00fa6cd0830937ee97d99e914673b8b000000000e8000000002000020000000b530145da2d43ebfe64a0defbb5f7cce1bf4379472cab764fad3053e75f151e9900000009086c0bee9e421f8565ce8e6b674fadcf534786287a203453ae07890bf24ec5ef59885749260d2d051ba06c493c5e45791797083428c303846554158c6ab13d32089cbc944f918b3ebcfb64c9e660d6dc5a0e6f6b102acedc0c8e13bca116d8ad6e7d4ea9c3229c40a790b85c1f63ebc807d3ae7bf570bf81de6784ab6994142aa16d6727dbe761c60455c005bdc1de74000000016ba4ebd82044459c06536ca16017ffae304d4596fb0f4bf5ac2c2560a5aaed528068bdbde3449649c27d3ab5c0ee1aace29464dd7a55bcd2f759f0645912eee iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6022f2fd999eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{251EA2F1-0A8D-11EF-97FB-6A55B5C6A64E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2956 iexplore.exe 2956 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 3008 2956 iexplore.exe 28 PID 2956 wrote to memory of 3008 2956 iexplore.exe 28 PID 2956 wrote to memory of 3008 2956 iexplore.exe 28 PID 2956 wrote to memory of 3008 2956 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\15abf9795d93c5629f29eb4e7f43451f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2956 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c5b9962909a76c4b8d45d9fcae64b4a
SHA1a4803a6129f3ddf2b34d82c3691f74182ac6467b
SHA25605cec49a9dcd149b296bfd1edf7c345eec246f1d50113e3988513d9f1e5a683b
SHA5121ac146c46e39a510ee923e6d28908414f218738d5de6443d622778bba596fd809cc39304f5b8bff6c52eb1904f14452130ef159a920f2bf8b3407da93e4daab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55db58f6d92861016ccea52a49cb03f63
SHA1b190db8fb4c80b2801d6937f3f9f37af1ef3e82e
SHA25600320641d8a503e9cca1dec269040bdd5efdf195c934e3f4fef23a68f548a143
SHA5128d3ec5a344cf08a5ea040e54db0b9252df6be69b01f79c6c559a3f1c81e72ee748a7c666ef036ebe919baf8eb610d72c35177d09f53774468f5faef595ef9a75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f1acb2f139eff51eebe03e10401baad
SHA1e8711f32a2ee3cc62fffff51ba28cf107d9da1f8
SHA256eb99e9156a5953d4a40b4da76e115e6923aed17e845fe145b9b14eab0049c173
SHA51236e3ea1080e4777ac36a30786a544efd3f9c71a655a077a3cf2cf92d7a0ae801bc3f4df67c365544affe8b19bfc880e58da26b92050eb93111fbddc70a3f0224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5610b5dcd53a4b8af5134f59e72a6c2c5
SHA1e27a42c6ce703f2b3c7898db20b5809bc358048e
SHA25654133f5c67b4175708b6134ae02d645824deafbf6fa3b83bd1b12ac9ee820016
SHA51210bbf0ba568c89be3157219e0cb7575b412688a92d7a7eee72c37b75f87fd31f9f91cd13f7196705687f4e2120d0caf7d2da48f2763702d10c1948b5efae95e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f00110a9d189e58e7323e02dfe4dfaf
SHA1ac9bb9ade7e5188e296a866005589b485517fbad
SHA256eb55a723df1a817f208f68fb7600c50c314d357f036a2fa307c1857ad44c920b
SHA512b983823c6de9cfc1589e3c05a790140d635b19ca742cc0d26e2316d8311ba3ded391447331cd243c360cfd700eb57c16b7fabc81b524ac66145dc58a1a88edbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5365a8090c3b7cb2491e4aec6483132c9
SHA1cadd8f44b18980aee0895ee3ccc56e7ec092754c
SHA256419d288e550e1f076c6f121ad279e5227dd1d21206d31d4493da6bd1ace1d82b
SHA512327e3c57e1b0be800b736f64944c81453f620abea310dd3ea3cb7c5411a561f4050c535ad4129cb6e143eac7c33ed558e7176d6edb6dca1476eea33afc21f984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535d3f48518d73455b0936ec0272a8727
SHA1ab1713be16e5f7e45190255a6745f1f91991951c
SHA2565b20294b250d7d89cc3aa480470308f4cafdc83ad8ba22fed544aa5bfb10eb32
SHA512188de7c8c12c58f976a87d5ae48b5a6802564b11f7d0b2fec22bca9c30bc19d047b65bc1db9b70b800c450f1c5d8763f250f28e53cae367d5f3119df8ce12c0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e44320459991958c26ee81f383bd926
SHA102f1836e6d1de98cb9651d61b5b8ecfb44a9858d
SHA256f41cd2416f6d4b14f7f47f99a8c1ecbeb993f54cd27bad0f03453d4fc155966e
SHA512ee9a62f6422220db615e7f287f05c77ece1c58bf75efa63caa66134b4dfdb30c33953f7078526df0bd45463004b46b68e6214465d96c3a1e2b50e02dd684de25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b70d63e5ff23c45fd148b7164d136c67
SHA1a73ffd9c97e903113d9f414cc4aafa79c902efc4
SHA256614ce4b704cc6d3edc77172361051c21e77cd5d77690467b97fa0b2b2f177817
SHA51294c3e77859907eb4d4bde2a5f39d98e193bad1182bc218c7a7d35dc9215404516fbb74e9ce7fc4719c5a61527eb74add790c6ac5e21c8e2aea776db02eb3efbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516e70991397286b63df6cf22d69ed901
SHA125399e9a35e639fe06919633b0c73e1e6370dd59
SHA256b565532b074d6ad3a5aa53fa9c7b6df69b43841258fadf2bc7168d03e6d0df9c
SHA5123edff7e347cfe8444bb862d2bac457f6b4d48b05a542c9d41eb52255e625ccd0b73e4ee2e15f0003a1fe125b84f850b733b558e1ba8bb6b8181dfc90aa5ff37c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53de8c15482f368dd3ae098650ab3c6c0
SHA1879c229c60801c02b3378d3ec94f7d89bf1510e2
SHA256a2e5f75afc8ec380d3cf3c3883554df55044a8a2db46f1d0d65ee7d1c90a1905
SHA51229d2ea98dad08a2c09a47307497a8a34bd3ed89c2b91b3bc2ec4ad4178c3f7423c8e847847a804c8265c90f3e3df8f262d4dafb99fc8c4717934bcc7814aa77a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52db4fb8637e4c5d0b689718bc9e1b41c
SHA1cb001ecbd649bd652b9e63512cbaf04ba09aac94
SHA256470c1d4c8980a6ee862ff2429f9db165af77c989c26766a6a4f7cdb6d1845de0
SHA51230fd5301e1aa6ac9fa12a65324c0e3c7c6d123e756199637cc703cc36c6b900a2ce5f96575f1c6a165f21a4b7bc4c37437bfd9a62a80764058b5e19473994f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545fa87dc0ea9f95f7f1ed9edb4cd8c79
SHA1607f2f39093be868f0c3d858cba92f33c701a72c
SHA256c7ca90dfc785fa20f26bf4ff1c87da95f9004d314f8a1cd4418158bc3f367a3f
SHA51204c3d9432b81d81f77e8bdd47d58aed4a70e3596d6e273b712310d5843b37a1ceda3b6574fa3829e1c6e69e35724ebb761a1c789d1cf7842bc7acd02041eeb2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554678445a212862b5c3c68be4d93e3ea
SHA13f418bc5ad8a2bd00ac818e5fcdda38f6deabcb7
SHA256fb3bdfdf6ebd0578fff4509fe08b2caaf3ccb54351b782816dd2a00a446f21cc
SHA512d5a41ca6e92e4cd8b8a133317a3d278b4d952aaa98a5b631c3e2bdbd551eaf671e3923118ece2e9b34fabb739e5386a88c90050aff7e6265ea2d4155f7fd194e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e55631f8966ea85ac0fbe12df76f82e6
SHA1a6b966fee6256ea1db17647cd7528d635d33e2aa
SHA256a7ee1a96f78421b804ed9e74833e59839f0493300a5554c91ff5c7013d39929f
SHA51247c2e64c45cb6bda9198a3b50dbccbd607d99a072721a1fbbf71e54dd0eaef59144cb02a83f3a06100b568397d4b5b474a524b3c6bf6c1059c090089d0ad151b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554a05162c407518813edd48ca73d3bb7
SHA1ec22881aab1835dc82f3861c3fae262a3c514006
SHA25671141aa6fb4659f2bda58c8551e248ecdfd4a338fdb662dc76668f3d6e942280
SHA512f368858bed6daa4becd7e4b94f8bd044a54255f0397a04374aba0cfcf4ce5691b81a0974fa9e9f94e834b62e5723a479b423607b44f09629a29c81be50fa929e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c88e387b9c7219b669c41acbcc37ce1
SHA16b095dd3a55a2eefcd1dae87c4993fcabea605af
SHA256a76bb97da47e04cdb104e428cdb0e11db5ddcb27c0751e52c163f8759cf52702
SHA51232f8e95baf7bb7e68f3251d61dde4e79aef88f63196b9a3e8d6c31ccf98697b7370657ea75a243af277e5baa0c4b91fe7bf726ffa20458c2e799f2c96b87bd1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e3a1037c33ff8dc77f63ebfbefed727
SHA1c57c3b85ec23e040874c0985e02769460c756463
SHA2560237040180eea2bf9ac8fd648a2d92d68b8a2eb744ae476a1eaa10be26f16844
SHA512249e60c08414ac1049655fed5679b0c64480d37ff93431797453924f6a2bfbfa767db605b73c6dddb02ff051624863f362fe076ff1593e2c5869d53fd28ae80a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed5b899e1b988b610bd5cd201d10553d
SHA1da693532aae477b8743f2d4a3554efb291df00c3
SHA25680c09ef8ff2023506fabbcc9adeb54c4b49c9d9b4853daaf95b87c9963bff010
SHA51241663b3888b04feb882c3b5291b1cc0b3102185f0bc75966bb3e47965a25157a025470c218b5edf3bd43e8ee133c066e6e59eb4c821745443e576629c2bd4012
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a