Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
4d6466491bcecbd6a27b17dafffde763_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4d6466491bcecbd6a27b17dafffde763_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4d6466491bcecbd6a27b17dafffde763_JaffaCakes118.html
-
Size
461KB
-
MD5
4d6466491bcecbd6a27b17dafffde763
-
SHA1
9ea195ddde09c65df9a7afda65c80cbca0c007c3
-
SHA256
f5efad09351c7db50464bc6a113dbfba7574dda5468266b08b6faf4a0b1dd662
-
SHA512
155c126f14f048290e3db7671497d73464b94cdf944f04a30cc74c28c365fabc60155fdd53b28c55c9b04125888b7d41930d6c6b19285bec0c2d7c5c36520fd6
-
SSDEEP
6144:SPsMYod+X3oI+YcsMYod+X3oI+YZsMYod+X3oI+YLsMYod+X3oI+YQ:i5d+X3c5d+X3z5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0173f5ae3a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000cc1a238791fe12cf6447de723dca53d570119f628b6578d1797674abbc76567d000000000e8000000002000020000000d7cf3f78b41f9427e6a8f0f463d6616b1764267728276372f87946c3b1f3d6d22000000095eda5a7825e8b22aeb01f7930e41f9fe8f1e84dd1710f87665e9cd046130092400000005d2f7ad190597c337ff1cc732a459d9734c32167b187bbb7f9948b0898295f8b15f0f3dcf55a15c182377a789022d59c45ef8ff63a270318023b3cb159c19509 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000e7cdc5efc3880a4dad7be80dca19d0f8553c531a2208124b6f2be4e492f4d6b6000000000e80000000020000200000000b7099250ee282188b1dc09d5906130daf9ecf0a96f54d7cb61f5bbf296d9f9590000000a165d15fbf4096c699c81d04d6b4296641890cc1073fc3851b3f7d00d55e9f6f88cbf386b7978aef3d6de7fd3b7c2d6fbedb211289dcd88a0b2b89ca82bc6b2ad9af262611d153f20a1f7551acfb0ae98dae11d1dc787083d1c074c1d046c753b08b6d00698dfce0cc9a988b91ae885a73ae1e7986ffc11f5ab69ffbae20502dc633a4a951e52c733a4794c6234f8c7e40000000985e5995b3004c2a791af21674550ae692e2974deff9c4d1287ff9c81ac35b033963f01ca878e9cf2900c6ba336ccc6b7a2ad73b13e1c90029831c974bf627c0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422061618" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{81CA90C1-13D6-11EF-87C3-6E6327E9C5D7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1972 iexplore.exe 1972 iexplore.exe 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE 2212 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2212 1972 iexplore.exe 28 PID 1972 wrote to memory of 2212 1972 iexplore.exe 28 PID 1972 wrote to memory of 2212 1972 iexplore.exe 28 PID 1972 wrote to memory of 2212 1972 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4d6466491bcecbd6a27b17dafffde763_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f7c3dcea785098721f6f46ac6e99f994
SHA1750bd7544bdb7e281c849076face17efc8931cca
SHA256269fcc1a7946fe29c03762ee47a073bacec61195297248a5795544e004e9d750
SHA51240eb3f12c045b8e0d42454379a93af71a2badf14bc65b326b7400b0fc474a72e7b001119ef1504fb479b8330cbae450ff1e8afff37f4e351c15205631241e129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5549d6518e2e54353b036f6eff84bfd68
SHA1397377ffb9be8b4badb061b9d07e2f2534c447d8
SHA256637b4fa10e2e08202b106c0ef5299654b74a2c56d066c2c9f8502c6ff41fce50
SHA512bea14f2b37421bace8bf5b2385d6fbdd12acab5c62188cc0c56060cfdd0867381eaf7e130bcefef298401cc55d0f30287874f87b403a578b70973d9a7b97a367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5931b5a440510398c43c7fd45fa161538
SHA1a85e6ec1164c732967512b31a4890c82197582f9
SHA25688a74aa0aedd3cdeb7e759e67784eef71e2008282410d666b5b56970dd1a86bd
SHA512a796941791da0c19ea0d9835f4c6ca9f4864d970a9f73486d9cea5c29602db3d1acd0b84def570fd7e39e0aa62958426dff64f40cde24732f3437652238c853e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD569f4657a6fff78a640dbd3b1a22ae22a
SHA1526cb151392e3781708b92a2b76818425129c678
SHA256fee5e385c1c803fdbf7181f4a1179a43ae4b2f25b8ae3db025be9dc9a0039780
SHA5126b271c7e55a9ad3dd0be7cca91ab981467c1d6bd5f9394bc8d3f3f06f9f6c9a8c345e1d1d94e3579ab02fcdf3929241cd12b5bfa765bb38456204d99f60c5481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5197c66b76e36d4ebaf9b326ea67afeb5
SHA1289b48b9e899d40bee45bc0e9fba6bfdef8268df
SHA256c49d7d135932b8d33dc9944265547380060c1fa08581864d07103fd233c64c6a
SHA512983dce5a21ca4eef8c7d22813925edf8081d876d13ea3699f7e99eceefb81365c17249ab650f0065648057f23d8485aafe3823d4512ce3e588b423331e7b1063
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c12fb1dc115c3dfe9cb7981e1df0b40b
SHA100cc4237c8cb2ace5cf715ad7594a437cf176293
SHA256018275d9e906a2ddad0fcc80660ff715a5c5fe48adc33fb7369a114dd3c25c3e
SHA512154a2d794ad032a8c94f50fdbb85450ff3be25cd1985a73086e90b80ef28127adec52ea67a630cf324583d90aebfc4c535d3ab11a04e880008b6261220f68ab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5481cd15b328cca04c4d1b73646baa7a7
SHA13afc979d705f512a4adc24450a02390fae95bb41
SHA256da91088b83966e0ebe37659d56f527204bf7afe7656fc4495bfcc93056bcfa66
SHA512213858823e6a45a1b75b9966fa28ebef22d7ea83fd5f569498ae06a187d286fe7859c63d2611ad3216ebce5ecbd675d95ab1836d5d92af88a58a688331f37338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a9c5762f42b2b589e19da6c5c23e202a
SHA1ae2091485e627c83a836b8d1cce69df823a1e182
SHA2568d4f830b96369f58778faaa8297fdb614605c2f1ee03e2e0dae786b1e2a8e381
SHA512153974fafea6449681f0361fc157982e34296c8032d53fb25ad0b8aba87d4938705527a70127de618e411fbf86d39e425b79b168205f2e1f152452aadeede6da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ae2dc765d0c86604f464f2e8891ac353
SHA1220c2de8418e58b0b6d0ccf49ef221c1c0c4620f
SHA256e3f43a69e8b504e673f4ace9e54a6565d73f3e587a022fe06f25957ea488dde2
SHA512beedca78caf95462e9a6fbd79e9080c93208b08307bb3e094c4b1ff79bddf1965416b914a672e4f752f1fb0d3d8a50aa2e5bb1f9f8b1ef6ecafd8e68fa2a5c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a5ac9fe47cc453a896f1cf66da77109a
SHA10d84ccce27530e8fd3dcaad081063eb4ab240b70
SHA256f37a64cfeaa3e1b56589719cb88835acc64d3f9d3032068bb3240050b58e3182
SHA51274836fd83d7f674e2fffff08aa5fc91f0773e0a5f549ef5d2913a41021730d26191963b5dc2f7c07946b8f008d6bb21db22cc7081f04698d76f4c34f0e4ea666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57053eb2b932eba77fdfa2657b0bcadd6
SHA1b2ac093dfcdfbac0287b1acab01cd86e2bbe68e1
SHA256daf07ae8d5d8162a9a5e40414cf68571af9c420b005b4821bc250d015a914b07
SHA512c5a158d181cc507b8739b6d20d454e358f36d039486c09e75d29909a15dfa1cb22a0568a2bf13bc8d0086022323ce7e2dc1801129c7340dbd362d8644efdb5c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD542f4b58c2107abcffca54aa6b0c72297
SHA17db9ac70426d18888ed55b2db67b45c376ad60ba
SHA256d3cfd31fe3906fa35cc1babfe2423a200eea2ecd27846ded06c0b2a6553e36bb
SHA512f08c30c63cf1143ef46dffc6b3aa33840e7de52a2e7dd8a4ba67842e3ecd5fce1a0a7df95d1c2db24a0bdaf267af44833bdd7bc799935926519a0577abcacad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5606e17190f5b4b28c751df0f2ac28ed9
SHA13fe8b672a54162286a876a7070b1c0dc2121f218
SHA2566265339835a2df02b99e8ebe8dd349992799af2538a7fcbba036ea805bd76c4f
SHA51256485c606dd121a3c6c4471fc6c9eeaa53370684be87f5da8c5b5304c63358ef2c8e2174f284eefd626a25aab9256b4cab4aadaa017741d329a0e054217a0f06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e2934c67b3f1bb2765334c7ddd5cda32
SHA10638bab8d6470ae90c827a8b26d1390112e29dab
SHA2563ff82cefd74da2b0480e8165b1cbedca9792f7a52d8f5accebee8bff0f9c7846
SHA5126155a1cc1c0f1d6b405ac755dc08f8917fc036c6bf438b9178cd428f5bbcee5703056499f9c8f12ba87cdfaccf5f4ba5a4118ba33b331a715a2e0be1ebcba4fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD567fcd16c2db0a21b102b333d0be7fdf4
SHA172caa8e8e3878fc5c9028a55bd62bc6106af4581
SHA256791997178174d0c4e779ff17ff2214c11a54dd182787d23d04af7a8194d43885
SHA512b55f8269dd8d0423bcd452c48ebfa62f932acc02b77cb4abbb7f5c0c7f5afccba8e3239d28ba6eea56010777c5f42cbe500c27463df8f4211e671d1b0babd03b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52eedf8d03e137953bec294720a527275
SHA16d0a08c2338e5a33969c28ac468b4731390601e4
SHA256189ac71b13e96bd17c1ab9e0729787b2e7792f99d351bec601e8eaaab74a1db3
SHA512c86c2c6a60407b453ecf9ec76a4a9ec93586c0e3e2b54cd62d30afa6757eda8f302bceed122f948dc082cd5aa470169abe2aecb719d0c7af916da659b5097334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53123507f0aed5a525d2f474e4dabf5cc
SHA1d1305e16d2154d093e100a17b9ed151f3448e14c
SHA256a42ddb357519172cca62f2aeef91a5e8094c85e549c734599d6a996f1a7030bc
SHA5122003bc0b1f864d66fd1b81e3621ac01f46210e26894715ed536efceeee03350c03c23fcec05660f2bb26e75dd8e99b537d8a4c63956755e42e44ad8c37f41806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c483c1fe6051b8b593e5dfa61393e14c
SHA1b53b6b9e6fe01ccbe64546087489aa9f00c5a201
SHA2568fbb9532a03f636d5d605cfa98c8a543e776718ce8a9987592065edf14738aed
SHA512d4f23e80277dd6a2b05c8c6c9f1ff9f8c868e3b6306de403510ce8e4c8925d5713cd9341a2197ccf9c8f2ad51596b431a27eb6f6129d82b40bc13d910bff8b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5316e96a794c98203f3050f4eb9c0e5ac
SHA1cc70e3418438e8fb7a8f88c1ccb3ae75da404e14
SHA256dc6af7dfb173dd7fb2a0eca879595e1bd059bac16401cfd5cd9df268a08a5698
SHA5122447fff3a1ed8eaf7003e7f62b1a36f897ea582f91861732392e475ad11656300a956cca8a514296e44ce3ef8635a27aa4c87fcf81ace2de1580269a1f9c5e34
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a