Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 05:47
Static task
static1
Behavioral task
behavioral1
Sample
388fddfcd766a0d412ac012d1a6b8544_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
388fddfcd766a0d412ac012d1a6b8544_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
388fddfcd766a0d412ac012d1a6b8544_JaffaCakes118.html
-
Size
461KB
-
MD5
388fddfcd766a0d412ac012d1a6b8544
-
SHA1
28a8f1c69e0adc6f4ade9e16dfc7dee3760ca80e
-
SHA256
9066f88d4710813b045d2e546a0e3fe4950b98138f8c51f95a7cf16dcdb0fc69
-
SHA512
d844909c1db4178364b5bf6b3b9a4c5cb54a6b2b29c4cb5666d641b2681c31edcdb76810375b39113e2bbbd1ef3895240350cbec08fafdb7e0a2abf67311e079
-
SSDEEP
6144:SasMYod+X3oI+YaQasMYod+X3oI+YYsMYod+X3oI+YLsMYod+X3oI+YQ:55d+X3w5d+X3M5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421654737" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 301dff0230a4da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000cfc9a938e708a22928689593261267e9ae4d995215af392163925370efc61baf000000000e8000000002000020000000df1ea3ff9a04e622486f884cd84ccf23587009a766f9a0375317851df28e4bc1900000001497188a620e4465148a098d1fe82e84af8fcaffe7e0af2b8da67cd37e61387992089557da9de33a3ee2282109eb93ddced3a01cb1c83cb793553b80028f58c6bb627c20429fb68aa64ac7397726c00506e3844c6bf29f154cd94a2f841c81d0e151610fe31dff43f4435db3cd7b058cc4763ed5f36df34c8e51e44ab7c7c11cf1320bb62172dfa028b60b69fe5ece2b4000000067cb85fc1d06004b896075106af67518247361fd2fa9f2af49f282afaefd87515b209ae85e3b900f29f6ee5b7d57295273dc334547016772994fa72596fe7b94 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000b7d0c2f13273f9af8d7957fc659f58d9aa5211df4387f0a8268f920d8aebc9fc000000000e80000000020000200000003d34e63ee0587f8e420912f1917bf5c6cec7ad8fdb308168d986f1013b46385820000000b140c2e6384b4ad11141e326c4c9556118dc91bd386482dcfd80a8c4534994bf4000000027962140ec93bbf0c168c87772ce0eb8f074901819e9cf4cbe5ca07f2ed60c1afa2a3e5ce94cee66de70405674cd257a408d0616a2b1f5fcfdff644de4f70ab1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2A6E6B51-1023-11EF-B411-768C8F534424} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 768 IEXPLORE.EXE 768 IEXPLORE.EXE 768 IEXPLORE.EXE 768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 768 2240 iexplore.exe 28 PID 2240 wrote to memory of 768 2240 iexplore.exe 28 PID 2240 wrote to memory of 768 2240 iexplore.exe 28 PID 2240 wrote to memory of 768 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\388fddfcd766a0d412ac012d1a6b8544_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6d234101edf478d8517343ca5b94720
SHA14b28fcdca804b416291ee1b8f95ecf5c6c3466d4
SHA2562a17b315db2aaf2aa04e7a4064323c9848d79bec6de910c50ffeeaa95cf25f76
SHA5120656cdfb78471bd48468ffc5fec4674eba978b364ec0acd92870294ab51bf3104ad0fde5a0a1e9f603a226de27e99aaf26caab37365bf418eb64419c3a872e45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eab4de6fccb8a103e69af65869b2bc9e
SHA107989e4048015770df07d98a8bc15233dae4253e
SHA256ea37074980fcfb807e1737bda439fc80f0666258b31ecd0bdc416c69ba3f1bcb
SHA512c20222917c71a3a1f526ca38054056a85a6959cf6a44c68ec9fb9a113c074254c1b592922c4378ee34b6d6d610df0067124d7aeeaa559d2bae0216d8d31f1d5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d33984255ff382e7cc620e4298441a6b
SHA1cb6b4c0bc469675305784acdf2e83afc164f7706
SHA256c2a7ddc19d99d0a3a7c94ba13d116377972c671187d7f29af2ecc68d2c13d5e2
SHA512b834ddc152ce30de975968f240bf9d026954bff4ccb961eb2e1b8730b5124042f1f2575f2ce68bde55dc39a52c32ec23f76813c2826c9b3c6c69ae8dae2e7f49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521b87eb794f69ac2c080d44f761cb24a
SHA18de995fec8c226ad9c1ad706f9bedf4042f13423
SHA2560650f382ba421fbaf2eb235084518bee093bbe08aa6953662b65e5fad8ff44e9
SHA5126c3aa7a5f3482a65a26f4fa3b4f49d3a29958ff01d47c4eaab8076f5459f5c762023ca7869db63ef712e3ab0145df846309ce4265ed3cc1688d93917919857fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587b34e3952a0931834ef4961c86d6ae3
SHA16f4d1d705ca4413ef6a961b8e8a966b63f363f74
SHA25629f6c4f4ec372c6bd822c146f286ad025ccea9c9519cbea4420896b4df0c6a01
SHA512717d55cfee3e1618c6f515300f2eb8916c56f570b30b51d60f7b384221d01ed1905605cf1b54ca52e2375c40f88e51247a1e67bfd94a6b8548d01a5803e7bfc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5702b58586147a09a39d295c57f3698fc
SHA1a8367dc68ae6a924bbfc53d9e4b2b1536330ac79
SHA256e781ce965ed29133a298c95c4a6ff73aa4716d0f14b411a4e59797ffc051d3af
SHA5127d2298f105710963bd99db07a2a860f783b0c385c9c4c51572df5c13605a5b4f5016bfd825264f2687502264e338f85dc8b537191108123fdf59d232af09dafb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d901e9f4518f15719fdd8d87ade6cd0
SHA1a6992894eac0703099b00d1c08f5f7d4113d8a26
SHA2566717c89ffadcedf6128e9c8b6845ac93bb8868ec283162e124c49aa887c30a76
SHA512f3877f9b6839198bc1e7903a5d10a5bfeacab75b4cd7e1b592b1cc4fb1a541f1eb2b85753c1fe06abdc425ffcd52e745d2bcb281314113e05a148aadde88fc3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0594603c6bd412d92332f1031e2c8de
SHA174d22d059323165fbd9c562df8616a3d432da66b
SHA2560012ccbd092c95034ff4c7fffc09bcfe18c38078fd181f7e2d53cde5e1f20a99
SHA512defb281915dc624d61c210bc8835cbd2d893e45f80d102c64a7c07df0825624cfba89e6d20d7d99e3c72ad483ac4cd847d9327f53629c30ca205d8986a371257
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5142af46e8bca050aacd47576430a2587
SHA1b8a39a90e9f1963be893e9c4293ac14bf2735521
SHA256dc7353788320e5ac5a5ffd779fdc83d3d45bf5990c0f1d0dc4fe883e1cf5b9da
SHA5128b44a3ea64939776c5bcd54b3a42777069445a83bbcbf3ed2472367b031f08a8882fd14a57434ef3a749a6b66df91b55e3c615599a2986cb3f8db954b5547039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5996a61153d9b3daba12ac87eb3a5aa0e
SHA187a21d71851ea817897e45e54a8e64012bb68441
SHA2567641ac9bd38a55d61d424d51fd77f773f015aa9cde557e60ade2a44dc1736c2e
SHA5121f5fa9f77f21d1829ed19f6e23cd8b1dca3e536e1674531d979d26831307331dbd77a4d5b7a0c865148f87821dc4d99c1e17dbe599480165b4c371ae6093c614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f06250594ef0b6717e67d331e6afa36f
SHA19cc81d0a954e9003c95ccf01115be86e8e14d14d
SHA256b9483369b2336a2fbbdb55cdc08658470f060209233c4ed8241c1e4507c70b5a
SHA51228a49239a981b599aa34df6cbd2e452fbe5143fa57617e52b7a18cbcdc78f24a8c35630345ecd87b3b894d8bbfd737abb6a6b1c16ae4dcd313759bbc91d62446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b37b4b2bc5516d1e4f9dada9b539822
SHA12b532f96c534b7253706eb6952a75ed6b042f44a
SHA256d9a94ee73fb505591f1c85d70ca72dc5a1409a622596d77eee071783aa8fe8a9
SHA5125b6fa39a4b442091b82638822c6a2b3cd24f59079ca603aca2f894113072934c2999a037772fd9506bc2441408430af4d4cae27f122c9a9b6799a55a4cbecb55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50370041b78ad0b710cd98a8ae87ff415
SHA1d7632bbd5843f6deb3ff2a9721e1f9dc7cabc803
SHA256ebeade48c8d495a250738327fa061981a1fdbc36fbc73915f95f79d5c61e9a57
SHA512bb0a101b109c6c9e86f5341fd32923bcf2cedb6e526bc363fb2b40cf7f5f8afd89e2a6971af58bb75ddfd08634a4bba106e5e85c984ae64ce58fd97cbaafece1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5768931762da909326a512ef312ec99
SHA18040d688fa2bb79d6158a3e8e4052ab576d8c651
SHA25633e1fb20777c3949fe885616f9f39b4d85ee067607167c64b066073382e7afc0
SHA512e59f460a01cee411c4b5c21905bfb83a97a4b33faa7df69a17adc38be43c25277ff0293c58a6f05e6c1550fb697a96e5da0af80147f86be2137e8cd59464258b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbf81b17828c55e940164a0e4d397d7d
SHA18a56a6c206f1367cc6e1621ffc824452224c6e43
SHA256eac5f525ad4760243947f6dac2a93e7d06608bc02dbd2fabddccbd72532035eb
SHA512b94a430ece5801671710232a29c3a03feb3043e627c355c6b5b6f2893694d964b5425b5228fb8ed0c76871609bf5409dc4f3bde259e4edddaef9997911bc6f52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e91ee4010e59ac97503e5e03f221558
SHA15594fe986e53a8479470e4a1fa12cd49aeac7774
SHA256dd31cfbc25c76dc07c123135ba056443cda1c56a119bf94d25b9651317a91491
SHA512f1de7b6ead997fb5c15b06841ef05361946962afb45b73efb1ee6331071a1f946bc94661323ea9cba8a2f0cc263f2dff5964de47f67cc0399141a0bb49b0e16f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a835dbeaf58ae5af6a996534b8defc90
SHA15d70d72f2736928487d56152c2df386c9eafba43
SHA2564bd62f78e7b0fec6eb18d7fae08d8473c8a1a506216ff2736dfeb06f58931a52
SHA512928dfc203b427b2b8a75472ee4e8792014e3f53a9a05c2d4a6f68760f177c4af319d6ca00b8062440674c07f575c302a48097ddb75f93bd684072751d5de847c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58028d4327269363d5241c4023b83693e
SHA1ed09fcb2ca699b91e337dafe92c2726db5683801
SHA2561ce9e695d142189ee710f2194d21bf7a5405f7f4cfa4be3fbf7ac4697237cb1f
SHA51280597ae8e7a4d12ed126eba03e285d3b0229f9348632c376a2ea5a20de45766c89cd6c363c3d8d66637ca6e68dbb2f69ba3ffb74195ec03f51c4b260763be115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53313e8f3160641b580304b3210ac57fa
SHA1f5dec3191e05f663d4a2e5dbe779635b09114f81
SHA2565dc1d45db46ca613b5fe0a90cf8afca580c3e6a075b320adafb4c0e82b404d0d
SHA512ef1fa9268f987bebdb6119f15be8e09da4c8e0d86b2866c76c4e34bcd6f61206b873a55324e91625277786cbb35dc6f2070c02d1b70c6957c4ce2f1851910959
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a