Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 18:10
Static task
static1
Behavioral task
behavioral1
Sample
30617ba5e7eb6c8e646f762cdf82978d_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
30617ba5e7eb6c8e646f762cdf82978d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
30617ba5e7eb6c8e646f762cdf82978d_JaffaCakes118.html
-
Size
69KB
-
MD5
30617ba5e7eb6c8e646f762cdf82978d
-
SHA1
ef728e8dc976a27a327a9bf59fc236412fd22d9d
-
SHA256
86abc8426ad25206686523f7d46d581c8c51127ecce35a8244546ca09f29da50
-
SHA512
559a2f0bbac96d84b49e6793db10355827188c07c00ac41319536c9125c73c59c53ab20613e7cd987f90337b6a56a3ac1408b4282da2006d3431b98e32f10477
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sU67CV2hqoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:J3vTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50c8026005a3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8B46D4C1-0EF8-11EF-A596-F62ADD16694A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421526480" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000035900a6ea073dcde56a4b2cab99abfc052388be39675e79fa23cfdd624e6223c000000000e80000000020000200000007493e778beabe5aaf56ad296544ba5d5730657106748d81e11c8523cd6b96d5220000000666bc04d55f8131753b0b32c9ce5ed73efd705890de8f2760c5e2463990a9fa8400000002235b3a2b6def8340c3efc7202ca36e5af2e69d1e42a17362f355dbf6baa95c213a0fe5a7340a16cb28be602aa47eca051f9404ad70ebf11eb34c600ac10240b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000004c35156a127508a4249e75610b7a1a343ba82874f5de14f6a7501a59f2b8e94a000000000e8000000002000020000000907001fc6b2565828a4e67c8bd4463320bf7145cff58f07b176fd962ee223f8790000000b194e33ff8e74c31f7a5c9ce5f92eff0f58f76d36da6ccde1ee28af7a7f5ccb9f4a43d07bf45404d84a44baa16bc584e2b05ebf38a170979dcc498c9d06a439c28c8cc846fb283366d2001981ec0b3f70e5f504bc03fc920d7e7f6916de1b8b91b27055af9cda8927f517cc444c5511440436e0d5a661e07fc26c3a0bb5a23a438db0d9798ddda5d07fd421a341b6aca4000000034078294e007fa50ac6c42cc19c50107857fd269aeafe12e5f80b6eedbcc6b64dd318ca8c8dbc70621fb89aef3284505fed2be8263e33b6162932b489ec28646 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2652 3032 iexplore.exe 28 PID 3032 wrote to memory of 2652 3032 iexplore.exe 28 PID 3032 wrote to memory of 2652 3032 iexplore.exe 28 PID 3032 wrote to memory of 2652 3032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\30617ba5e7eb6c8e646f762cdf82978d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c02fadb47cee45152e14b3d25e7f199
SHA1d78c4e994382370946cf33ff6f7217d792820750
SHA2560e96b76e0fb7630403e2c8b0a3d9b5b8286e1eee4f8079b7d6a809fc3b106aa3
SHA51250e2ba95acc9bb671c9eb794722fbc4876849d902e7bff8b84da41f040edd09bfdbcab6300cc0474fffe8100518db49d6c8a71e390b5abb139e4b63298d450e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd12196f70b05ee40b53f2f5c461e511
SHA153525810a27f4cab76a81955b6e051cb2d73f6ae
SHA256c0260123382e65d0881a498a6fb494e450c6f47532cee730b0f3d659eb6dc05d
SHA512793b8df0ecd93c1de70e8cc7ad2ebd9e2c5dfb32c3ad3e939a7072f9d880d9268201ccaa4dee5e19e4fd2f561c63a493d39b3540f87c072ae64c42f6747987af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbc766d45f9d63418a78b45a3fe2340f
SHA11c17d42d3d60e408e4509f191b22cdbfe4993dab
SHA2566fd63eb46eee7df90b4e73f3e561d305d8a52ca0d14aebe1b99b132284c0199c
SHA512814f78695bcf7ba3c38d8be966f51d1c087fe966330c2f27489d60d09c4d66a48cb4e3bf598de198cb7322d92a2a78798c58e6cf0a3dc464be4aa436ce237831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2c2dd6bb22d86cf8732125071845269
SHA1183b42bce523b4caf3a8ecb03ed7ecec12860c5e
SHA256df49e31c1b9d10a5ae42feec76062d93d3a853e295a7d4c385ee139e57f9ad2a
SHA51275204752920b285cf05260d4b117d07ed2d8717b5b965e547bb15cc13596c8190c3d038d963da8cbb8abb3636cee43ddadd792320b53269afee12c6c7da05a48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ee1cecad5d99e465e21d13c1c53c07f
SHA1aba4c8af97dd6822f090a7f3fdd8260c3fa4504f
SHA256bae92fe85c3b9fbb9ee44e26a1d6719a9ffcda27efb6a2a894d94f8c2d0374bd
SHA512b06fd47cb749cfd0c8813db46e8256c52a87645a6a567f4fa421365ecfcf91b231845127b4b18e51a9ed796b2316dcf2aa8ce69550698294734dd29e3467daae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b53db036dd1a33689d26a1ff412ab8d1
SHA16b403b1ae0b1cfb301a52df6a095f2181966927e
SHA25618b4a0eb27a57bf3d9abef4196db24be02ca4e56c6d5c89e51fde5b55a4e8d76
SHA512b84e09b4fc75576b215fccb9ac6af353d638532da2fc509ae29866c4dd98cf52c37d41cf87b41ef8b2ba63b37eb6ad19a4c1799a9e33e834c5fc597efb78cf5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5940ffded90539c28c6b77d9a45d49c91
SHA1ae31dbd4a1fbf1d54a351d20e8c72e45922d3a0b
SHA256886a3fe8ecf2169b3eee329e4993222c78fa8b83511c24d98a6d96a53c537ff4
SHA5125254cab2e0bdb55a143605653fd682a827f57c13f0fec4ceb958657cfd97f5f4e82e95d158363228dcbe04c0c285632f1372ebac4fa5a1223b7bfdff70798f45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce49bc12f6f8efbf72d3e24e3dea8bc4
SHA1e84b1383c5e6418d205b856a71402e08a651c101
SHA256117a0e65d314b7886349124b85c51d4a80a97c4ccb3572b44b76d599b0acf27f
SHA5121c719c4f85eabceb66d7f29677d2faca5059265394158855061b40133b7d04d253d60018a5d5d90900d70c4114fd5a120acae65c6eefa3f1bc9310437f1dba37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550e8d66ec8c4b611830ea192a0517e61
SHA167b523ee9e423a816ce6191d74bbf2943dc74a83
SHA2569fc876efd0c741f5b769c6338c703326348d879465314133280b233d16344542
SHA5128ee5d1dff5600aaf927e4253b98abeceaf4e0e8509d099578fb8e3aaf766c6ed93330de3fcb25743ad2c662211e338e6aa4c62451cb9550610a1a300b3fe8830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d70865612a395d4cf6425c25be97281
SHA11584c2c5cafc72bbece89fee33a12352db2b755d
SHA256f725384b20bea3e59fe2d8298a8a6c3c2342c1906b931d3c7e76ac2fc32a1e1b
SHA5125db6a4c6abb1f800fd740694bc063e6b4d2fe3757312e5d60a9feaa94791eecbb94f5d5f53d38ea05ee83c4cd39c502e43433ee3e27d68ebdca70a0866ccaf49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5448e3492efcaa5690a90262a529aa576
SHA1deaa8b0d2df643d52f6cc50d1c1bb89bdb45e179
SHA256da28ff664a7818e8d1006d772750b18dada21dded2644f521422d35c0f195d40
SHA512ab410b40a3bcbd2222ff6bdc40c022202c865b8f1acd87c5634cf3920d91bdebf77db0105d273740a8970b4e0ab3ae43c685b424a1599632681b8eeb0ceb3781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4771322ba6506af0f548c70634e0624
SHA1424d0161e5901845b925d3513d3852ce47683bbd
SHA2568fc5e4b5818a75bf54c5e95e4c40ab2f96d4d855a87f99a3e91351467e4047cd
SHA5126c9ee6c6beb239302479762a074ab8a870b859a06852cd2402a193343ec690e7d9017cd1672658e6b27aa6a38754b6775571bc0a7cecbe678982ef951e0f2a90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55df15647d31ca897c52148cb4ce9bd1b
SHA184c60c3c18fd518fd31106b0527092e37efc22cb
SHA2560fb1481b57fea822576da0ac07555491457b2f0ef194b46c837e52278cf1fec5
SHA5129e8cf26fd2e435ffb6c13be16db5d6a73fc75087763563bd72210d0db6bd5fb67162c45e78d2cecf03d5200cb7d30d24074685a81704225606ceb69950541781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b03daa23de7ca57a3f2ad214936b56b
SHA1d994c4bb36e9724d1ac136b61212c1f2ceb547b6
SHA256bc44d850eed25de6a54d26e823048c84bd08928a3c967a8b46dc44972929f120
SHA5124a92936a6ac1acd7e55f4731d2941f2be6989c81093881041b8363bc5bb527d51480d412a990ebbb28a5a0a25e936d0b2df00ca317764516eea65247d1417fbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de2c2280ca1c104524790a7082c25b92
SHA158f2acd2ce101cdb6e306dc68f71a24c43f3be36
SHA256a84c01554f6e0104d60e75f98f0ca5df92431ff28ef6644fced3f0f8156471b8
SHA51298373f2af5932fa91bf25f68eb37d35f516cf28445e152d726f582ba9412757e97b6ced76b00a2f07cc61da271ec7e196f59ef36f3edc6b7502ceda0c6edd2ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58efc64956b0085b92513ab7e4ea4626d
SHA1415218b52b000c899e878a83d898a06f453f1fb8
SHA25622cff81189bccfa45b5f65c15a6a5253519072eb82646ee20cb91d5b59bcebaf
SHA512d3e9fb8807662f6309a67fffdd03f451c967c2cb736256ebb286d90a27560f234429bd03d384521f9734b148f8323649b4bb68d80b882ed302b0488e00e6dfc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59050b6d25f2b0309572d77b993531632
SHA17620917397189bbf6a923b54ac984703ea631eb4
SHA2560729d3eee74bd98ec3d0df5ec6920c5fc009d67fb7ecfb35fee04c4a080fb9bf
SHA51281a611c0625623533b6cdf633879b76fe28d0856591ba0a843f730a059e0124eed03fbdcfd5f9bad47bd26eead76a4ee4fcb8dcbaf1fc6f04a30d2f1274e1674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac00d995d70ade6e1e07da3d52c94614
SHA1f745e21336b369ec727934b2d1a4a94854b1601c
SHA25615e0ec8c4cbe2f863f68432598d53a5945a6633250a4149049bd76a196db0717
SHA51228ca50573e22094dd658ec0bed25e5ae0906dc6da4b8cf33a16d388075faabedca0531e71ad5025535f2ce2988fb9891e6c6b0b6630299f30f5ae14f076cb048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e79526c415dd3a2e2c9c3968209afa53
SHA1d3d697aefa41a949f672da76d468396c8aa0785c
SHA256dd5dc9574cb321d31546f4cd467f7f06230c3c976d9571bc6ef0d5d3470ad9d9
SHA512a41b9272cb4af4097b349603677c8944cc31bfc41045d482dee73b4968f82b9d2ae763c06f499d610ce83cf5573696696d98e0bda7c972d72b348fd5440c9a20
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a