Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 03:11
Static task
static1
Behavioral task
behavioral1
Sample
28049f47057742c8bd46524bc7488758_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
28049f47057742c8bd46524bc7488758_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
28049f47057742c8bd46524bc7488758_JaffaCakes118.html
-
Size
34KB
-
MD5
28049f47057742c8bd46524bc7488758
-
SHA1
a4d6fd6b3fc9a403c01a1230e9c8f263723cc3f5
-
SHA256
4ac327aea3b260d891a319060d4d3fd8154c88aeb045b85e314c5a30d2338aa5
-
SHA512
0094471f9baf6d811f3009c9a64694ed10baa4673caae1db8d31137186b1975d84afbd5a5fdb15684b3688db9679d16ff1c4d2fa09ad8151cdd1f59fa82e6c24
-
SSDEEP
192:uWnWb5nFijjnQjxn5Q/hnQiesNnVnQOkEntjrnQTbnhnQflXCwRA4K5Ake+kfaNe:uQ/P7RrzLMr5p3+HzhEFqIQNOq
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C5F7C2C1-0DB1-11EF-9A4D-7A846B3196C4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000003f80ce74cb43b98344937835aa7180f8fa70d23c35f9730cf37b6c63e1ea695e000000000e8000000002000020000000903e97935208c09741d5bbcec26daec3b0727407cd328e11d6eb9d5acea14cdf20000000dae6502752c4cc0c5631b8f5fd1016d557c45cdc0474ff65ce5124a6cffeae73400000001ddd6607b291f5bf5fc3a99b0f18768a0d4b38985195ac444775b4366326346a873cef3851011af8705cc358f9dbca0136f95b5515d984cf73ca0988f6417086 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421386133" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f2b69abea1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 3040 2280 iexplore.exe 28 PID 2280 wrote to memory of 3040 2280 iexplore.exe 28 PID 2280 wrote to memory of 3040 2280 iexplore.exe 28 PID 2280 wrote to memory of 3040 2280 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\28049f47057742c8bd46524bc7488758_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585b05451a681a38038e4696c2fa66eb3
SHA16a926fe759f08ee6d2838bd09db2e05a0ab9ce47
SHA256a03f8ff7ab29bdedc2358995dd2f5bf48145c374af94edc720df5c7b6c46f5b6
SHA51285f04688084dba55918b868ac044f67df9b32929c56207382cee9f80880610a9d34692ece771523c2e544e77700ca964c4a7550f8da6506e181bb2797e152575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f16a4f7509dc572171fb45d21b8e3e8
SHA10982b07d1e687c407ad16044eb21ef56c12b4b14
SHA25631770e188751dc7837e7b740e63d954c05ab601232e172cdc7292c9bb1823ec2
SHA512cb221ad5052bcf4e35c6559ea009f81723419558c3b79537ea71f57caf72a3b8fea9822be77afd00e8b75781fe0fd0e865d6d5d66d11b8690cec48a4786b0590
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b4033426d58138b06649b1223a436b2
SHA154065bfcecf974acc822875bf25b00eaadf81355
SHA256c32ed50c75fc2580ed46fcb66b1c54ea455b644e44c48dc72fdcc06a9ce48afc
SHA5123451469b5c1c63fd5bcd8ee6b086d5d6f915fa486a886378bcc3b1ecbaa482517e2b5753f3466715bd15196125891ef53bb0707ad6719b30c5200d2972db977b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5811663a6a7c281e8e0f7beefff573727
SHA1bacb72091ca1bd30df75c98758e83fd5862efce3
SHA256b6d17206435fb58a28caf586e77ebab663eb3ba081aa0054c5db80b43e0a6ef7
SHA512fd83856df0bddbbb0be3cb3ca5468007a68bc0ad9a5a19a09fd106a65b0fd848f2f683d25782b3c9f2b168fbb13d4bcf8fc7f1e700d5fe90d791b589146d27f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c33887b1bd6fe7068a157621e885d087
SHA129f95963aea55a1879b1bba9f3fbb0a45b90735b
SHA25684eedca2b79a4d54514effe4232495a62c4ba492d1d2cd971cb5982043518ad1
SHA51261323720b74862de3a03a268cd9559e7c21bc128a910881be18d45c58c2289a756bb2d160005b98d09195774f2cf64d446ad70ab7f2657583a5eb0079e9eeeaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea386ac314a68edc52dfdd65fd63150e
SHA183cf014b574b087b96926c9ce9bacb9d2f012cff
SHA2568bd9308b57cbbecf944ed7197b25919a9bac8bd10574c0b9cd61241b5a60b3a0
SHA51242aff3e5c022082fe01c8bf1d58b1055dfa8a0a645269664b8b2fcedcf4a295f52006560d73629d56ccbac6684f062b77f94e29f4e8cb561bc241c6985e5548f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc2739e88efc1772b27a39d7c5911f6f
SHA109399c0132d4ba6ed447c4fb73b07ce3bce7ca26
SHA256f91ab70355987babbc993e0195cb9ee170b72fcec46743b935dd8b401b34674b
SHA51289a7ac7c807bf4784aba4cfd889d2794804ef22a1555bbb6c7fb4d1183f662c833f3692ed62e2adc43dc8744e7b99b34a795a648fa2f7dcf85ccbd528c271b32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5132fc8e0e0fa3a3608e4fdc98dadb5f7
SHA10c6771e1ac524d102759bd653a25bf4e0a170eb1
SHA256a14a0f2b35cf092c6c7d7e2ed6d0f63d592dd3d970a4633827f2169e84dc2d68
SHA51237d619d21f72cdeb6a91a896468c9f0d5339874da8099833d5a84710f9e0da04523199572bb5506994b1e149d5a5d16a878e7433fbdd4f390a1949de094f124b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8bb1bf3c054ced9a181e46e5e9ddc15
SHA1f25c95d46928e53b6961e57f5945a0821e9248b4
SHA2560fe547a0e23f14ed46d883726d8418f8d1e179b57c37dc9971952a66fefeb349
SHA512107e0b38582c385b205a5f95de0e2a93cd64042af1a545724f81cbf6387771347b2b1701bd1b01fc1b5c35250a8c04dbe3cce2b936f00bc0fe44e6d5ed28088f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54720d00db9e99790033a8b475f587718
SHA11398e9b117724e9daac5d0a32bdfa5c3128ed59b
SHA2561c3523ddb5297b4faa5c6bc72110eae6cf9e67cee1fc08178156aeb44652f41a
SHA5127a53b0b9f1facb214d70990884670598be60f86c5e84dfacbfb8a5d7864d2bb9764717b773f814c3aa62048ac4aa45b2514746f22530920e95bffb03a8c083be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e4bea8d15b3ccb0893d3dc6f4eb63f1
SHA1c39efc1fc69e7bee7f659f68e62f610e191001c2
SHA256c69e7686758f834fe391e9ed1fd8c9fe1a10fd80efe2a5b9b1b43a01cfa8a32d
SHA5127b37566beed2ef078a7a3a6d36aaebde3f7dd8c46ab5b2653b6adfda4582b2be5814718564d71762f281cbe11df857ccb15393abb792baa0e68b77582ec2069c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb94e4bb6797a73d0f05b2efd48a0eb6
SHA16655cba1c5401155ae5036b031b4783eee08db33
SHA256f379fa7aa88d0b7b29ed368eb35d6a3e53dbab1034452fe0e41b4bb14e15fbef
SHA512cea2740a0aa6e1f0196a84a09f0cd570d585c83c01b4ffc7a22e453be287084dca0e35dca4b68d45342ab81fa04cc60c76056db6b112ae9e0466ec5d80b8f712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54de873c12a0c45ab0273e8b68cd4d231
SHA103c16c321edb4b651ff1aa7617c8e1a702b03332
SHA256882d45248bfc07760c6d398209cb0d59b4d7a05cb989cfd756a8bb146d4a4ddb
SHA512c43c6073d8049c2d01e872b18ec6bb33fa462c97283ca95d98ac03d8e691cc041225e821784c6079ccfa06d8ecb725512a89effe2b9ae09ce322885b4e71c67a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f2d22cf4630fc3f2f93b5a11f69b2bd
SHA15b8a26420e3b10fef7606e65858a3bdf392519e2
SHA2565881aaab61bbb2403e0b7f5ff6d5b42c7a32a936451bd08c2ada1ee84e534d6d
SHA512453df14f7040f816db629fb1f206e8834a41df16056f2de563101492b4ec7576330703d6832b3797668af88ee79ed5bdc122880e860dcf44b6fc8403f4ec1123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f20c039cfaf8a074c591020fab1e5779
SHA11affbc192cde5334f3e13f29df359a5d66cde772
SHA256662f4f2bf1fa6d2c368bb660f40fa6d732829fdaeb93e9cfcbb99ef83af01ccc
SHA5120ac252af41d0df056fcbe9218e24166b0bd379fc7b56eb08ef5dc813b13d2ef38f72dcf30c0c489d6faaa51fd8550fc1e2a7356121a1060830cf3fe263637c18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc27b59593f8fbeb64b4fc4d01c3558c
SHA16f3bb18242e19d8b134a72dcce48423add0cc1f0
SHA25622c1a4928ffece373c4017d4884f9988989c30a21de65e7a4c3ec4ee69ccd7ee
SHA5120c6c745efde8e0eac4714c8d61c8f7e70c6b84f31f6d3c2b1d899e0ea574820df3f04cc0579cedfc169efe771dc4619ce0f20c0257b3abe1bb95048ed17cfdbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5711b351d5a3ad1dd3dfafb91e4146891
SHA10325cd6c89ffbf8c38ec9a30d61ff7ead400cbb6
SHA2561c062c6377122ff7e2d57126766d4088869b52c3fd75e8d2a9ff9bb753fc7c83
SHA512a47c95436cfa2d31206439332f03479f1c5a12acf6d8cf3bc71d536ce1734b23e4852b3bddb526a9d281358601f7e3998955be206689fc82a1aca27c3132298a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc4597ca85c64c57a7c83b489ce99d97
SHA11bc42f274fc2775cf83e94796b691f0f527b286d
SHA256ea7fde95c11018e76fe49fd5fb13e5947579bf19ec65fd2fc066db0de53e7f35
SHA512442a50d0d19ec48a628c78ff73cbcc494d816791c2187195819d82ca59d0ecbfc779b280eb585838f71efcdb8076dc69d49e5abe06407a18e9876e3d51845543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f9eea3c0acdea0ee50e01f88a495bf6
SHA1995a19f451800b6de6801209276456f484446a04
SHA25646cc9f538538134500543a19e81fe02178522af4b5edcd7aa9331073b6fb504f
SHA5129794edad440d742f962f9a4805e839223e4436d1d5e30cdfc219388054cc208ece8ca11a34b0255e7eb0204aaefdeb839e5653d3719a67865abda67764f9d838
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a