Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 20:32
Static task
static1
Behavioral task
behavioral1
Sample
42f39fba49aac882c1c8946332e4655e_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
42f39fba49aac882c1c8946332e4655e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
42f39fba49aac882c1c8946332e4655e_JaffaCakes118.html
-
Size
6KB
-
MD5
42f39fba49aac882c1c8946332e4655e
-
SHA1
8d1fa37e943c069adec3fbec90e4427e8a7a85a7
-
SHA256
c15c1a46cdc3570e9d3cedc3849fabbe287acf9d2d8c2508aa6bcb2d08008294
-
SHA512
b60ade2bb29e034113f37e632c00e54e87ae09cc380698d36a9386870d5ae86b7524f6a03a18f80b0ba7944f0f27cdc967c18d58c4a8df75229bbda83503ced9
-
SSDEEP
192:twayDwax9000ERK4XCwac7waxWwav000u000VI0009Zwa6z:t8lwg+0w
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d01105803ea6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000a5828378c929a9d47e896e4891138a6540434741d8e57504e1a3fcf782764e15000000000e8000000002000020000000dd7505447d7292bdd54445b6e20d45c01f5303e64e6c786fea70e6d839224cd790000000e9830bd885dfe97f56375d5bc4065201d43fe94f885eb5b0e402bc2952d548c11094976bc49cac1249898c9ee3d5dded994a961d6ffe4ecaea17b2565d9a3de2187e6aaec4829ad2e9b513508c1b8f2e66572c99016272e90fc2bad39bd61eea6609eb184b3669e485496d159eff7dc771498030c042c0587fa51fd94d5364b1ab71b87c86fcae0fc1adcbe983cacb7e400000002fee8cdd232fcc10ee3ba70cd8515c0f77207b9e5bf7928ee7e7fb2b58234e5b50e76fae28ca1429a6e051fa67df1abf54f71bd64788667f5b549e3e2359bcae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000907f704db5741b2ee6f9eff7385791d734b0904fb598a8f6741921fd0dc74b24000000000e8000000002000020000000c64ea79f27028be402672718640a4a6b709e61aebf5d977640accc02a9ad23ca20000000356f2aac8f9d49527d06ee9fb25847f5878c1397a452d4e264c52ec63805f69440000000f19b6b4fac3539fe257b4f3b8d6da8b45bd17a8f6f6ee032d38fd598996468b193db052f10ed5dd56612478fe6a2242b897285199575141b06ab2f15b94a46e8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AB9B64C1-1231-11EF-B7A6-525094B41941} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421880868" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2368 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2368 2212 iexplore.exe 28 PID 2212 wrote to memory of 2368 2212 iexplore.exe 28 PID 2212 wrote to memory of 2368 2212 iexplore.exe 28 PID 2212 wrote to memory of 2368 2212 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\42f39fba49aac882c1c8946332e4655e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56800801c841a2a26f40644ac717ba976
SHA1539554b5f58c460c287e3e113920e3283962a591
SHA2564a074458331ba2c7c7bb16f7b3298136a823c24025e76ad9f13f844d920c8ffd
SHA5121549f87ccbb9b6b97bd8a1b453a7b0eae416b24b99c038621edf3e1b9d64b987f22fbea026f6aef80876ee2b52ad12e1ae689c27d3944c53a118fe8aa6d60f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5435c76f86cd885d6461485b90f010d8a
SHA14fd9506e89baef0c8b022680217d3eaec5f2fb41
SHA256d316bf1f199205bfc83f6c0fa21292023f3567ca545bbe65999b1162bfadaa3b
SHA51223b48c5add8838bd056c64dc027b71c6cdc307f75dd6f612261f8ee90cd7a9ac82c56d46c748316efd8b8803803b307d3e93419ab4e60e5269b0ce5bb6491f32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59063504af740afbe9f4df123c203e575
SHA16a2469d7640b364b4bceee94322fe048ce9d2ada
SHA25664b7e77d11b7f937a91cea4cb5dc8e173a1c8099a248cd2224eedfbeee46672f
SHA51201eab2eaad1ee95877a441c7b96d9b69a874921273a12749eaf195682afe09b40005921b8d356b06eaa580ae04a96a4d0023713ed857c369b13322b70eb14d6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c31d329b3a7a07962ec22f722457c54a
SHA13a9cda2bb0d377b1a49acc6bd486f7b10bd2ccb2
SHA2564a2b9fb54beee4470999d8d5ae8d2375b8a1379dea0f615aed77c1f374e9e806
SHA512d19fd908c6b7949f690e042a19e75027bdccf4a6651797f06bac38b11769871ace010e1b4c51ca3cad853e76bc78386124d56fcbe708a0578fc690521217addf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e912b6680fd0ee9906140d55e9812b7
SHA1494110796e915e96a3b1756ff0ff5cc3ca092ca1
SHA2567ba2fab0065b1bf886338c976a574978375471efe483de7a9e76deff49402069
SHA5128dad7c753af7a4542b67d08f27d7b95787195a257f7004a5df5322df081af4dd471695bb09e7c77b57e7498b193a6baaf35f85f7504add3e974e47a8c1e99526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5333e728b0c8448fe959708bc16b90bf9
SHA15cb34eae56a526dc05cd03e8f508050799920369
SHA256de235ba7aac3ab7c73a29d4d3757a79b3257eb6584af1deca881efc3a1e7bcde
SHA512894a56ff660f0df441926f2e85fcd122373518f6c0538499cb03ee3e17fe86b6090c64cda9d9fd678f2e9ff0a9090ea33ea50d4ac98b33a138ddfea787a66276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51704e33555b131e97504a207252ad74e
SHA181ef792d304b61f22ffcae20bf7ae9428b4baf1e
SHA25652b803c1345aa8f015a16cd586ba828331f1acec29be52f331764ad60065fe70
SHA512c45313e3ec5dfc2813fa4d34b8ca15f907f8013c7b6be234d1e297d17be9159a18604202fa8af3f6834f9f05c4bb10997ce8adce5fb7bd4996bafeb8d6e5df02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3861bc15f028e42ae2adce791c51ab8
SHA147549a972e78dbd5485afacd2aa7250da942161e
SHA25627bf13e82a5a78e9d5cfb11cf73dbb338bb199689618ec9e06557628b228f390
SHA512b2a440ebc334e6e2bdb3fe0d60bdf5e2c2686908f4a90f504b34215674841cd944e4570b951c94b692d819b5cb0f7179845253dafdc2dc7ba33675187abdf50c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c1b5fe93ac632b8304885190d745e75
SHA12fe44ccb68e9ac607ff8cafc25598714652c6ef8
SHA2566aeeb7c4961f652e92ef74959705b1e8c6e2687378e4933e67b21f508f0ed7a9
SHA5128dfd7db3f1e6cb532e5e75b5966d927d8aa79aa93c52a3efd43661cadf6d9f931073509805fdc4c15b000c4cecd0fd45cb48065d8dc764e228481b5193bdfb66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2e5eb66a1812030c782efb25f890ef6
SHA175436fbe192f45fb495d0e1e31f543f04f2c93d7
SHA2561350b45d745ee85a83134583161a7aa1b0bb4bd81a9cda758bedb8265b18099e
SHA51271379a195c6e10b0bf8a3973dcd8e8aceb72e2113b4b29c5c6284b9d04d524171c9742532871442f0a8c639c53427ea8f8e0db194ee66bab7c3f393a837e818e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519cc63c4473386eed1edd5f4369664ba
SHA1b14372149ab47272822962790c7c81b11676b986
SHA2568b16f2c90a84b73563e135e4e8a889dd3b538d464d5c6da7b289103c17052be4
SHA512d0ea29b59f5dfe1c109d31d021a986b03665ff9c7bde75060969d19e1f420090b8eb356ff4aee449f1aef7bbd98acfb29569de623d9256bedd63a29b9d9d84ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c1fda56c70053fb423a91b74b6fe775
SHA1eb37b651e59bbc6cff780a95255bd95bdea89443
SHA25633002509310101b7bff03b491b4187a541d0240ddce1859a265a695808b6f8a3
SHA51243ce554a0957704429b4bb2f05eee546e97bb8a2a8a28a207f80c5eeb0cf031873e5675d78bab457038b0aee22dc16e4c5a94c50241d543156d6f5b7134de419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9aec80b1935aac69c768fc78ceaca8d
SHA10c18bda91712017ebc51a8a4f71263064cf99928
SHA256404b17317857759fdbf3519dbcb8e4593b710374bdfdec7a752bc260f9ac36a8
SHA512b3b7da499ac4bdf346cb932b2819677d739e5522ff5e8da2393e734411a224930c0d225a99c35ac5d3d938322c3c604923e7f144b0f4d0801824ad108fe9856a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540536d7198ed41edb8e87b386b31b3ca
SHA1b9d870f992304dc063e02033b3be1ed8e772fdec
SHA2561a42522582d4eafde4c9f3cac14222b9a68dc5fa43ad1346f15efef6981a6253
SHA512ef4054939d389bdd42507e34f359d55fb76e86cddd1ed9a1f2ef6e33ef4ab75491340c36b0a3ac4be9b16241a4847a77f45096f837516edb44a525fcb25c1c64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59490b051a84f7570dc82623f32561cc1
SHA1fbf39ec7850b7462854aa090488199273b3f38a5
SHA256706abf605c7cad98a3f57adde155d29abc7bcbb365a5c187fa9af9003c00455f
SHA512997017cd766f172f3ca043f49353ae6c29636053754d559ab6964ed30e3b2ded0a2309dffbb09cd73f627aff974f512ada2dd8248952feb965db301f3db3a958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5429f27bfcf1c6f5f9dfcd77cf2f1a690
SHA173e006de71a0ec308031c9d9eb08df833495a56b
SHA25688cee839c8b299a86f7915fb6e387348dba3cc43737d0d72b94913829765fc4a
SHA512851c5dce95911acc17aed89788bd91e96e0a31c0f4207b205afc24140f1cedcd25a18a54bac43445e5f04ba7c8b9d6d189aed0734678136bcb2b5a2ee21795fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5558e29ac70cf781477db39d3ffcc4b6b
SHA18f385250ca8d2ad5247f3618f003c920c6769346
SHA25650d7c8ae324dfbad46947a99f7152a293697461cea51f4d005891cb6c4918cbf
SHA512db348ba5494a0abf53d8d0bc2f5f6cd5218e52eb7ae06016b7eda237c19dd3a23f689afe2d5deb14fba6d938b35dbc8c6ada9d3d1774d62c5ab090df434c1bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5335087032e76f3663bd80658a5c96969
SHA16aa642cc54dd00af6cffb00fe5f25336ba5fa43c
SHA256a3a8218ef4fa0015f35ffd8e5eed8f372f1c3fa08e8e5476aecd4bfdac46c660
SHA51298afa80f31fc6176c388f516485350d876c60dd8e96965e3b71504dc4278c4181ec3b0f6f1ebf7128019ea45584b76e600999c779fc1916339dcc10b9585e079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5157f465b2762bb026dfc2b4614716c4b
SHA1dcced2132281cd1d97bd0e2665349e4ee1eaf2f7
SHA256d927a4127ad736f068f715c4f4865c7b95b842cf6272ed2b57f37dfe3dc516db
SHA5120883c1fc73b4ea116043e6d195375c9753362b90580c35bfd349fef640e5421466dea1407ae0a706d7d2640b30e241bc46da89aeafc4c77e102594d01a079602
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a