Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
17fb154a735f91c969ed1e28c3e74e59_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
17fb154a735f91c969ed1e28c3e74e59_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
17fb154a735f91c969ed1e28c3e74e59_JaffaCakes118.html
-
Size
16KB
-
MD5
17fb154a735f91c969ed1e28c3e74e59
-
SHA1
0e46e30f8989f30da2507d1f2d3cafd11d8632ae
-
SHA256
7da9adfb9e2b4b7e3fcb9560eb1ebfdcefa7502ef8c1fdabd377607dfb54e634
-
SHA512
1ee1bcc32863a813e11481e11eb45499475b969ec40a8f1636addd3b3dd5c4df31aa52a0a6be36a96b5eda1cc47c955cc5aba431a0b619884e81fcb8daf9cc66
-
SSDEEP
192:C7MgBEOks1QTxE6av//G/pvUe5rsJmNJt9JGprJJXJSdJ/zJRs2J54Jqb:CIOkjHav/O/hUC4ulC/8VfMc
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70683b87f39eda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000508de4935f9e03fab2572b4016daab27c180bc87688a2a55b949e51d6ca7e036000000000e800000000200002000000074e833b888dbf26f380c910490fc9b9e0915f0379351c662db2a10f9ed6d0e4d2000000090f32bccb4fec38093c94b03e0bb912f4eca2bdc044840d65a8f5e84357bf4624000000045c387d8019c8645e5e6d5aa1d276b13b5769ab20a345692bb8ce3be00c01073dc04d209df4e2df39e384a87a2d15998f8971813481a5e52d4fdca45f92b7135 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000324b7679a7fec69b3f0dc3bfd59e8a0ba1ed00d0b768ee2da8aa988a5c756366000000000e8000000002000020000000b884090b845badbd62b28c8c1b60b628a5dd66a5c2233c7526c2c6c0e0f93e3d90000000b268ba47c5bc83661c5247a24e75e0ae6a1ac97e7fd22f1bd25c47aa8baefe201bb9a74e70f5f5f826a3ac285655a47efcec1b01c6368162603bec9017eb0d39805c8b6c7cd0a2db9d3e13717f77c1ccef40e20e946a8cc5eceb80415b91c6bc6570f5795d86fdceff179c6293bbfdd736af0a4682a23752337c0e15736c1bc90baa18ec4be022f7fe632269dde5ce20400000004509caebeaebe324e270d0bdb1f599a8fcadfcb5ceb45e1496ec33a13a8cc2f7665c2942af5ef0168fea4c9f8baef6d901df3e3900c5726764aea0190db4b5bc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AFFD2731-0AE6-11EF-ACEB-F6A72C301AFE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421079006" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2028 iexplore.exe 2028 iexplore.exe 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE 2256 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2256 2028 iexplore.exe 28 PID 2028 wrote to memory of 2256 2028 iexplore.exe 28 PID 2028 wrote to memory of 2256 2028 iexplore.exe 28 PID 2028 wrote to memory of 2256 2028 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\17fb154a735f91c969ed1e28c3e74e59_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5548b9624f23eb2771026310d33a17887
SHA16ec50461cbce10a739ce8beffc6b8c0826a263f8
SHA256d797375fb0a3efa4dc4db88d3fe84c00bf9f13cf6184214db59b47c8a33cb955
SHA512281bbb870e084224cc487df0dcc8757e67cebc38e43b8aa4c5266be9197efadfced631fab8e3e1cbab952422f7b06b2b6dd69b01ed6ed4c2c2fcc30b30e38ab9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c4ba52ca89eae55f4e20ecaaaf3d3c0
SHA1badd5e26d39a8f80ab2df2ce03e99831c1190684
SHA2560dbe72c094a98157dda812f1687546b27fb8bcc81959428dba9897877440e0d7
SHA512884b647a34143e5a0843e81aab588690112c5a2fb40bc406347854ebf8d857352300de64bc236d4a361b25c7742e1f99c7946585e8b15a694a535963a4717c79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5967b66fc6b13e8c8090118fca653ea6b
SHA132b19fc11ea87af7b66126277da0e0b7601e573d
SHA256e9d0553b530a1296c4972d8654742ace194d39a44a0b1c451a48294206491d61
SHA512de618645c1f2cbbf6fada03aa4d9e950a463566d938bd90f8c10bec42c7a399dd4ae0872e47aa6ae02266a4bbf32175166109b95ffcd5f8158565f99dd8f8edd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577defee7faed89b2c4e557a22ba6a015
SHA1b5b5b927eb07802bd8860611bf2a763d3afac6f0
SHA256534bb922f80d2d405e226d2c7bd6325412f2fc00e37e4ce5cf13cc21d1c0df00
SHA512d5319e32d36bd82f74ddecee9136395ef786668871762b0ecdc57251a8f2c36a2e1a1f462b2297877c3ad31335a9ed6b9a61d4e2e0ccb970ac3a8f7b9d5e5b1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3e7393a5663999acb96b3c0347d9261
SHA11b2e110dbbdda605b12110295535a6145819abf0
SHA2567e218709e4466200cc49a7ee7a63a7c2e971bcc56eb1d1bf0fd9f76ca3364da2
SHA51297a742e1292c834edf9753a980d059c39066757aa8c60c972312d9f47d3a497878d94b7f935a605bcca902eb2cda73d6542d7b91a560d00b805d877530c9a2f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c99e98feffd243493174fa862677ebce
SHA133412dfa7f13df20a75cad0f582a2be034bb520d
SHA2562aaef9b28cc6cc7b2c772568333c834e0fe5536eb526844686ee7e330b4f9a23
SHA512fc4a8571fa64e34d609b1e878b8009686d8cd5eec74a19617dff40ba252df9e7e14e9f6f514de0596f95d57c9a6446a005ecd4a8c411561d7ee9da71eabac768
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518649772ac989d6dcb73f6b1cd2db183
SHA1c906f9f8a9a407dcbf7f3f487938881677a7fb6b
SHA256e6cfc177bc0778961289a75533c848351d98a83c2bc2226fde202466d3f33c8a
SHA512235cf23826f7a5224f4c5b1db2daf77c771544d78b55e86442922cb8ca6e57ceaad1dfed3b5ce9656eefe8029c4e3e45cd5d40560d4250487420341c28f04eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e091d9d14da35803f4931e823bd32fec
SHA1085d33baa5425828b9cbbb1aa25bc192d5148fdd
SHA256d3af603e89d6f43c94ed23611e26bf3e7530e878255b4039d0033d24bbbf2a3f
SHA51289e639f84bcbaae4150a307f8c932a536ac653c9b1e7510a8f562969f96b41bea686956139361636a1935f9688cd9e7e6f005afc747be43bb1149ca5fe0fe0b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b058ce4a419ce89731671301f81725d0
SHA1c51384582266363d4bb873c907f096309f529ce4
SHA256766e0d112956eeef6630414a454297ba31e3979cb87ceb95df61c4995b8857b7
SHA5129366deccd097181294cf1b64cc337868e95b918b8f19ceffeedac4fc08735d93d7eba94b3930acb1df8e2bd8911cc9962788f1349ae04a059a6bbf67363f9cfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ae13e38685eea1e6c7a49edbb4fe6e7
SHA12454341e0cb27a8d788db0221a4daede55c0da00
SHA256c0889c94a260072ae9e918612b6bd786c3e5b13c1c6cd83a7c57ddb5690e3d68
SHA5127727f9e9b5c0c743ea8bf765cf91adbadf2c5bc6ae1425dcf71f5a0466cd0e843c7a270700d2849bce12565d7d5a015fc8289de7c327e9c332c369991b09f5f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e4d8701531c8fb0e5910676c00b4e10
SHA1ac7808a5ddfa8bc16f9c31222443b9d608d9722f
SHA25621dd03cdce6c0ea2bd05da072a742f26e06716d3a5c3abcc79a2829e26173698
SHA5120fde0f11e6d795e72854137298f24ee159d30d5a6ef2f376fba6cb804cb0bdb58c15c9bdfb343b03db12929365746d5d8455bc980b5178b208e522655f69cea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a26c112698398f15998a70d384b2fd0
SHA1b34a514adbae4a4fb28e09ef06067395ac828b4a
SHA2566a0b97cf57319fcb9ef1feaf74d77fcc356fd8e5a0e69b19e5aa77b9e5dea394
SHA512bb82a31a70945714a188914622dcd6dee0717fc3988d800435a4404465ac7e9e69b0c879c31db90a319c8bb8c0cff1561859df4dcdab51cda953a9571a75141d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f27ffcaa6ca56bda7d60c4b016edac4
SHA1567c79241952edd4f381f2438b69534aa85635e2
SHA256bb2923a9d696c5819d45e4fa8cbe5700e51b9b500af743b197aec462b0c083a5
SHA512ddbe79c0caee060c931b03b001b06868bdb8b4351c870b6211d641315715197db09605926974a0dec6528e497b4d9db1edb5810e49d67e6737f2c1ba2da1b210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b480b20e2ee3d22f520c04a65a6444d9
SHA17fa4b38afe579a5221d8709868bcdb801b7d23e3
SHA25607c4cf522521907adbfed85c5a2ea9d2507c94d815004757b176c27f6b246661
SHA512fe2d33476ccb7b50c431556d207c1eefc0b1d2b4e73a28efa222b32e90e0a859d01345bd7c33e9e4f6f769696f1e6d8b031d1c8cca42de690c5d837321d75095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5644181ec6dd540b6e80817dd1d76e04e
SHA198f185a1acc71e705e23539db78bdf362c63ed82
SHA25660268b466b708f480e1ac1ef11f4e8050d1f1e5c845d7d7f15307d89f90366b3
SHA512da8c039cd549d0937fc6d3c9d24854d0fa457dba0b266a77d293d2928ef7001255c26d74c55c419d4cbffd28bb57104a33c6e354e5b13b227217095293dc8d92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b935122eb74c8d402b459b40f5c3f83d
SHA17253de275bb69577817a73ccdb45062240e5d9eb
SHA256ed9949d735faf5397aed4c07ea2a56dc243f43d1a2c8aae94bca27c9b996f0e1
SHA5127d6f0f40f880941bfa94b2fff2fbb8df12ee562a388fd3271d24bf73ba7043c64014da19be49524b591b3832eefcc00086c51b06f898dabd07eeb9e9ed9b57eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c81512388a8809319f34a27b6ce94fca
SHA19d9d889b36381cb497d6fa1fcf0cd8a7c1e1e3d8
SHA256726384f6a252b43133e513fabfa35925647c1cbb371923d7bc53bcb5f6471758
SHA512f57757e633dbb04eebe30e23e0a1e2601d83d90ad97f928244ea2c94f08160e7d3bed0f5894d5098730c14afef2e4163be167a7bef6146180ccb267261fa5775
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50403084a59ecb8d3945fa120d954bfd0
SHA1b82246943021a820a81d52991065f62fa4681049
SHA256b2c096eb0c2f628756a99304a6f0f8ee1b430dc708697a15fabba7e3b60b3e12
SHA512439b1aabe8a720f1d89f302c47e2ca691c382658395ff84a39d786554eec44106dc5c481391f7314e9aa76bbcd87b587b75557ed806811f735352577144eb3b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523bc0557e4ab1b7110c13de2dba45ec0
SHA1ae328d7f37dfbf23528477fcdc7eba69b2296d6a
SHA2560eaf16bf31861cf3ddb629c9ec65f5a790d05aca42c73040102b8e2fbc478cb2
SHA512d632ab7c4c2fe87409c2f8b0420a9ce3fe0bd242539df5cba3ca9426eb278c221c136ea5e7542094b502ae0b51f4bf8faa03e0c15c055afe037ab1b7821160b2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a