Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 15:21
Static task
static1
Behavioral task
behavioral1
Sample
2fc43dfeeed5f57b3ccb2e94bc0bc7e2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2fc43dfeeed5f57b3ccb2e94bc0bc7e2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2fc43dfeeed5f57b3ccb2e94bc0bc7e2_JaffaCakes118.html
-
Size
461KB
-
MD5
2fc43dfeeed5f57b3ccb2e94bc0bc7e2
-
SHA1
7847d05eef387c50c3eda61e00a44d2f0029832e
-
SHA256
c21dc166b8b6f0cfd443711fa76ef4853a99366af6ca8795b054558c4fde2b04
-
SHA512
e50b9cf2261a6e0918c9b6938d9955f70780e098df3ad561893bd52ec3c235063b248da69bb9873eabc8635123f5e4711f22c1596a1355ffcbbea267d2d869f8
-
SSDEEP
6144:S9sMYod+X3oI+YhQgsMYod+X3oI+YosMYod+X3oI+YLsMYod+X3oI+YQ:A5d+X3T5d+X3U5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2BC8901-0EE0-11EF-AC06-EEF45767FDFF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421516347" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 109590cbeda2da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000000653dd1b27f34509215fe63cf2e3fd4d9f8ceddd85331bee28bb1264bb306992000000000e80000000020000200000005a9288f43a3c91f743798b4bfaec9282ac7555a17ceaa78a38066001c51585f6200000005138f4b899f811f6c63e1c8e9235740ca098363c406925a4d02723c313e38ef340000000301d79f3f9292b5e78c524447c0473f0d4c362175de5b87e2d8f5c85318fc308193044dd207c0f4c86a1ad9c84c6cb44e2dd38b05c59f74fefa7211ea33277d8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000008bfbaba351632f54794e848a1854be1dce12b0fec05ee8152b1e0312ca319849000000000e8000000002000020000000da8bdcf7704c1779e5988fd682f3847bdfa4b5be5f03f0da21e383fb9eee2ca190000000f516a25c164db2c48ab680057bfb7ce961ee0a1894da5433ae70310facc06638829819cbaa07fa601b3288accbc04c5f5b8dae9091e68c607fd82033671e28e362c32503bba113a68d5053f5b9dc81e4dc7d539a43a8a8102d2c0f2c07e15842cd9a61638b6e161ee8f51c55852a8b50a4fd22e28cd42e7d432a370c73b44f2a71704c2124f8e2bcc2920c5351b7b32e40000000ac2019c80aa7fe73ca37fdf73e6ac026c31aeeafe2c54eb94723e2cf3249bc2882048850dd18e7c8acf90c36e59051ac171bdaf715b18cddd839603d09ede9fe iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2244 iexplore.exe 2244 iexplore.exe 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2716 2244 iexplore.exe 28 PID 2244 wrote to memory of 2716 2244 iexplore.exe 28 PID 2244 wrote to memory of 2716 2244 iexplore.exe 28 PID 2244 wrote to memory of 2716 2244 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2fc43dfeeed5f57b3ccb2e94bc0bc7e2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f169911ea9cdf15a0d7d9dc197b66653
SHA10b2dee8b9f05d68cafdd700724d80684403c1322
SHA25684dac2deca777e2d568f28f131087e52e008ee37a9f2660aba31648b0795bf51
SHA512ba2eb9cebbfb2fe14fd837cb539714d25cfdcbd052687977d7bafb74f84df2f0dbd56678fc90b28354e4628965ee6bfefc0a4bbffca8b0878df820610ad3e7f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a3a4211879c1dd9373ca326d59f1a23
SHA198ef08dc08d8b6ce1c91e71892f4ca34c7abec4f
SHA256087ef87fcfec6bdcf32911a5b1c788ea8c62b3552f226b0fec5638d83a2b9e8f
SHA512330558115b2ab0b424908764fc97c8db88c4a79eebf219c76430ed4e48e3494f1148fac32bcc52419ef022e8c89bb4f570cacaf2f1d0e1a004ff2b8e44d1b66e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5534a77138da180a17186ac0b9c22b5b4
SHA1e7b0ce3158af6db5f79a468d9016cb17bb32776f
SHA2569005bce5a3d9ddbf35cfed4afdad01cbf20bb45bab9c84bc08c7b553b2f4e29e
SHA512b973a10f0004756609c20df75065ddd3aa4bc525b0a16c108bca68aef80a5020c1ec85d0dd766ef71b9c670ff0e043a882c25f659ca082262f1844406ec975ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4773123d80308056abb5be822ce508d
SHA1318baefa0bd2d56c7344b93c9126e4396da02ba6
SHA256da5522e85c9e109538f7ee12e477b5f755cb91c17b0e3cffe8f626216749c961
SHA5127e9ba20ac746429f809dfb5981fb43a6e80140871426775093703aa50605faf6c4cbfc5b508d67473857d40eec491c723b6295d7fdd66124e31bdc178b32cd21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562cfe178460ae8ee29407b87cfaa659d
SHA1d200e33ef39569319b4de6c43559e1a5e16ec0c1
SHA2562ce5c5005120cb3e55815d56667b191246eaceb629afe03daec51faafbd51abf
SHA5125fa2acbd694dea488e1f0bfe40d9b85d8c74812fbba1206a76d841265faa0c5b1b98fbe4bba85fcc83f7aca05a685132c479fd095a07ac0d92b88438ff6314ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4d1e15172a76e42cbf2f165251fe6a3
SHA151e8ca2878b086e13d3d5ef212d2bc7de73629d9
SHA2562dc8c6801dc4e4be413d64a930f3b957dc4ad6786523d4d3f00a6be30e4900c6
SHA512dc8e472059c63efedc12e7256c6279913f42bdee437d26987646ae82c15b920817a2a6aea36e84d10d159c6b6ce287ef78dc55d71c1630eb5dd0378ad613634b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e56c3b619397473c558d65ee3126bb47
SHA1262842d9723241c37fc8f32b1fffe3654e523bb6
SHA25627378df4bc1f8ec3346052734f25bf62296c837df2d2e1ad88231e2483f65ce7
SHA512edd57c43eaa0ae27609c1a7f58eed17700a085e1040b0d956a7799e6ce1df67e8fafd8867ff8753f01abd2d1d119170dc5fa73a1b8bdb35d2ba90b74815e7c9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a12886ac6042a865ee2455eac5e5035
SHA1676313faa08e4e57510b57b04cb91b7642c76344
SHA2564df0e232d8883156c8fe16a9bbc7109e0778569ddabc1d6a640ddecc0acc0605
SHA512f4dd2b55e457ec158d28636e160bc379eebcd93d861380c96d18b7b1a9e050f2ee7e8e2405249aaa28e1465411a7b8d65025bb8f60728b2d53a840f9e853485b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518e390fd9bbfb118f935eebaef8d0aad
SHA1446c4a2c744957960edcd606cd85ffdafe7b140f
SHA2560ef2723bb3ebec2ea5a8a4a44378728fb0885eb263e6f4461670ea62dc02b964
SHA512a580fc92ee324c013578477d047b6c91365110327f9c3c2e14398e33a5beb40827e2c3559bf6e39f715b65573e202b1945a23b31934dfade6d8e9f632b7a27ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7670e2b3e850e657063621a1f99e4c9
SHA1a065a053d148eceb6066cbfaf0a74c4363d82164
SHA2560f02a18e384d70bf84fc09cc1fcbd17f4d815266c8d0c1ab775340768ad79385
SHA512d7e5972bde476af6d7de4f7ba8f0f5cfcb344363009c69adbcfb1715957857e93cfaedea4de492b1a9ffb485f184d38508d8c8db07063291bbaf7c367e6c1796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5924643cf47d05d6a1ee6558bbb7e07c4
SHA1b47cef4e0661bcffc1d57247600bb7db035c0d4e
SHA25637fd269fa6b59ccfb257fec53794353f62ddc79a52b2d579ca891c7ee6e50aad
SHA512e2d9d3f5afdbc0c8f60baa31d1cb66df9dc14c592ddffa019d53d6f4e748970b086f9ea56210c915ae54be6ffc06bb05fd330ecf270931391589bcc0d6d1f492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c29dcb2a540f5bcf51ff4dd2808de2e
SHA11769ea89a6e2d4664f5372b100c2c22c5e24e5d4
SHA25631f49a1b0d544619cc1e67ac267b9cc50a2e8365574f5d73bd714174189951da
SHA512e97b6bba9c4b8482c6623abdc1b48d144601a1e78445bae9705a647d79169e0c7d8a10826aa995ec9eef215587623ee7536ca9f9e774b0d7cc010924cb817704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d060847e49c0ba4e45e77fb6ee946cd
SHA15f3c8cdd9dbae4e91aa010208743b044b341d229
SHA25655652174b1fffcb016c72fcd8ef42d4f4296204f6767c976c8d8160e98c922c4
SHA5121c611b007832fc846c240ba8aa6b0466b0709303a619b91e6122e778557cda510c8c610520af31b577d8fff90d6aa2e605b3d5c57490c085ef98d7b59b365ca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4bc8b81929e8164768c7010ebf35e9e
SHA14f0161f6fb50866dc96017306421ec7f3397d32b
SHA2566d4dec9a24b7c25ab635e5a7d9f9beba1bcfacff9aa2ec235e96f608920ae85b
SHA512f2829f86eb11ab7ffa3004bcd10a1aae0c2c986166ca76fe753c0449ba881361ce2096937dd7fecf87504b48a1f4e9d6487091612471023755b25f1e209e15dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5917689f9d043f121f4268d271fc43853
SHA157b89edaae678208ef5e40633099cbd6c0797443
SHA256f30ce107530955d12083b507118e2226d0d43d4826b2d985f54f67ae45ff0cc7
SHA5127dd4e4e5acebd140c105693e288f7815ac221b1d34c68c3c21221212770196f37face40e19e44ffcdc8a86ccdc1be3bb80d6ab20dc124e855c690c43263c1fac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7628b59f712587a83784c710810cd1b
SHA1546a42ec926d1f830bd5f9dff2312feed0fe305a
SHA2567776e8fb2cba0549dfb3df9042e6ef777e4e306ba330d7be4979cbdcbb81e731
SHA512420e2861255d3920d42f22a487d47456e2ee23d7b2c591bef6ef70afc4afc7e801f35207ee0d74674f8e63d16da6e09fe97759b269b52b04b302e6bb238923c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5168d02cc2c0948f1ec80721bd09b2119
SHA147135671c68384349bc84940b89379cee55a2c7d
SHA25659759bffc3b7a1d79f3c02e51062bb9deca215c45b7c6971780a95334ed57f35
SHA5125c6f35fc5b8f4c09ffb5fef931ed7f572aea1ff40ff5ac903b15f0496ee90fb7d2c6d1081a274ab19ba147faf2ab378fbb80f48d2597cbd6cc8b6de03888ec34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57840ab60aa04f378962ea8a9d73d1a3a
SHA1ec90ffa0b67becbe940cc2962b2a98fae72d9b58
SHA256c06ce4043645474cfea99cf09437e4cac7075f79f7cac2a737257fe0f8851bc1
SHA512f24f49e5d65d3b4c8bb9f6c3b9cbd7be8e9ab485b123e53e7f414f3044163e01586785ed8d10703addf6a7a2b15c92c2027d17db88b512d63513b49b59ead05e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4efbf7b7633fc616f03f02f0c20d114
SHA10aadf8e9265c4a72e3fd0cb90e6d1f664fb8e0e0
SHA256fe1b3403c0d5c66ea7cdb4e9e85093f01719453d8bf3af78d4f9d5e530a74aad
SHA5129e18b8cb2a33472b61914c9da854376f333bfd47d1a354e202993b509d21449fc20945560513c01ac2653765764cd9c22c2d3ee15b3475948219b673b031e1a1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a