Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 16:29
Static task
static1
Behavioral task
behavioral1
Sample
4c00c715de68819b387695cb1fef8793_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4c00c715de68819b387695cb1fef8793_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4c00c715de68819b387695cb1fef8793_JaffaCakes118.html
-
Size
1KB
-
MD5
4c00c715de68819b387695cb1fef8793
-
SHA1
61104a65052c09c904c82de7d560f1a40b76a224
-
SHA256
22b915c9e7236d2ad289ee6bcfe59023960e98ef78d19b1687de9fd656545e54
-
SHA512
d2b99e2c67df91583afdec99eb33273ad93f38d5d737748bfc896bba16df46ccfa7a0a4d728fa7ce6cfd5f73d985c419c67181c964c1d70ce0f31d23f7d5eb08
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F971971-13A1-11EF-94AD-7A58A1FDD547} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422038849" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0ba2954aea7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000005a802a62013970fe88411dbd94f030f61a58894005bdfd35d9a47494132ce8bd000000000e8000000002000020000000f84ce1f3f843613af52b003e83a1571f1a9cd8981899a1141fb971ca1ec46e0720000000620c74cd62adb473e683e4f206e7d591a2efd4142a36a742a371de654d46cbae40000000385c0b55cfa3de7401d8895e59ab15d7b87479b00de0a4654906744c580de457004688e5cd16a3c2710c283b6ac83fb99ac70d2aac37ca2071b1ff910a9403ad iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000040ef50f2d2e091693865049e8505632cdefca5e3d223364dd39f8414f6f61831000000000e80000000020000200000002e04b2194864782258b13579607904b730f1eeca9ba468d1d8f0ef2f254a9b4a900000004bae0d8b251e2a21f20b1340f477162c23041f91a53d5f84d007d4e13c2237a3f67154509b34314952362ffb037f53ce4dd1006e2ccf49d90a435c09d7cd5644bc6d4a16f2d6976975b7b7137e9506c79f519b4204ecfda6832060e91d7480f0964adcb2283f946a6607e246f2421ee4795875ec7feeb4c9ba365301ed18841a4cb9fdb35129a4e332d2f04d51c926e140000000fa7928b5f797df9400e2d94fbc907d2f440e602a21746315c9c5fbbc56df7bf68ecb8b62695bccdd4bcefcccd38fdc262fbda53cd238a5905bc4f4fc2f7a0ba9 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1252 iexplore.exe 1252 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1252 wrote to memory of 2100 1252 iexplore.exe 28 PID 1252 wrote to memory of 2100 1252 iexplore.exe 28 PID 1252 wrote to memory of 2100 1252 iexplore.exe 28 PID 1252 wrote to memory of 2100 1252 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4c00c715de68819b387695cb1fef8793_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1252 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576be741174e33edbb91dac19ac225ec7
SHA1ef12c22587f2e00830d5c56b5e91e1a34bf29d8e
SHA2569d0a3b6da29e7eac73aa005773d058a4f41a3ca9ba106af589dbe499a1553885
SHA5126d6c694b27cb5669fd61a3beb39cef032d9594bae38e12ba75c4920eaae14a97efb44fd3c9bba9ab4ea0b518d06ad0212a0ceab40a5ecb00227bcc6ef721b74c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dae85016919e077d852398fe5c1b6df1
SHA1cc5e518839836852651ee35e2b57dcf553bc6ed2
SHA2562c4110905acd4dfba6c74100b05515830202c051b9b2dec1976cba8ab2346a1b
SHA512dc2823368fd2eb93873553544016eff88c0178e0474e929108a0f7be9239429ba807f006e7bbd81c4e6f9e1b9c712a9eaca92027185ffb2d2ba0da39710b3f4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532fbbe072421ffc6f0aca9935c63a937
SHA1b31efde24065d1bcc0756c4ef1a216f160a0241b
SHA25632bf8f521ab5797beaec22776bb6ca6109003c76a1256aea46caf01852de6c6b
SHA512890e3478d4d5ba83c39b9c793fae8301a627eae6adca5bf8dce44f621b3e860c329f80087a957b8aff3115511ad455c50ef12628d1cd4bf7d50b1afb5cf852a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a567e8332359f9f3cdf2369d2e4cdeea
SHA1feb114da7a1f48cf1bf98fea356f49e7ffc11437
SHA2569d23f4a41e254bcddbdb6ad9d4072f775f68346970cdbe64027f5b24f9d8c21e
SHA51287573135188bba5ba51dd45faf71083ae0a028d67000ae6fd83c1ba286dd110979cdafba31a436872db1690e0143645c7b65a164d30e14023b93258338856cf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561a1ab3a648564535c15c5e819c74e4f
SHA13e19221ec00863ea4260be37fda532bf4acd35db
SHA2566638cc8f369c0842e0f306720c4353903acae12d9eccddf2841b7048e0c98c5a
SHA512fa1c965125b2ca2d312a20de155c4217c23e2bf3d61f6e637a670be9ba4162cf7973b9138532e8006a0ff8659ca9bfd8d6f5539cb4c4acc1de24e80a9a49f3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df4ecdcf69e72636e57348c1f51d7041
SHA114e1d17e624b74e58cc76b2dd80b0dd6c3fcb7ad
SHA25680044149876aa0694c498adb387dbe9d68e562f7347745bbe3556b337eb0f8f1
SHA5127720e07871906d4027d22e093d042132b0fffb24d298276bf3c0de71851b312d920b9ca50439ef8dc599ac7b42344e3a32eb1e4f0d9dc3d14c4acbe170320d29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dfe9320a2fb6fa5e446c1d70f0c43a0
SHA1035348f73aa72aeac3092a4c4d3dd7e2aaa4154b
SHA256ebf92896551d0d52d17d19e9706c59964bd9c1a9fb69da0c3b152e12b1b62e16
SHA5123c719696d3b1e88e3a2a2e3d4457babbb74c923e9bdf3ca0fdd2ca8425f62b4b138cd50884d6e973192dbd01953618d1294a9e62598858c8d16017564e0b975c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f524f9fbc30ff0087b52cd93e1af8276
SHA1cdca0faa678750b70418c7686f5f21262cdfae4e
SHA25686dde42434055776f20cc38aafffe51e94a99be54db98b97a52447133f003f32
SHA51277b685928653cd4cae6e56ffdfb74c3362ea029c09a56a77e55397e6e59fa6b0857b93d841b5a13d926f1963df649f36da47881527c9c456cc49710cb64090cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590d98843ff4c12272ffbcc692373a886
SHA1db299c5035879e4b17a1c5eaf283d24fd6dc09bf
SHA25698bb070040994db2c4553a238bc1df9aceffbe49cc1315f0aff7f4e32a9c4655
SHA5128655a1fe72d64cb0f6561a18f98f394083e2781f958306e873f298718d65bd8ce30ae96f7987d4dd2781cfa9683dc99971b944a487824fd99ed54778f6a61b91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54124bd415615166eb3718a0c869f1128
SHA186f4dbf424557670b6e5db6f8a09bd7367f38af5
SHA256ba4e3a5020d4376e039efd781bdbffe66c5850ec537e10341c9847f81c7c9c11
SHA51222aa415ad65c39fb91d17883ed8e4d2570121d8389b471b4b03e58622f63e93126717cd25846393b473bc1333f8a8ca27d15e57ec2c6ee7990951a4ea5ea6b68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b9a4472106562bb2935def72aad493a
SHA1ef69b31a410525c635bf8badf4d3d035d43e7477
SHA2569d9bbe0219512ee3194624ccec8ca84f6a1574a56341aca3d80e23f8ef2f8a5a
SHA512278804ad4e2394eff19eb49585a25ada3c124f180383e57d5e0fa2758ba8b061b00880545968d562b88aeca5e2130601a1643802f53205686ade128eafe9e252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e93d9fda2886b8edb954ecfe3e39b36e
SHA1b8c2ea2d8d0250825e9146cf59fa8f482f6bf321
SHA256f7d0548a44a9f81562a96605a4a331481e83bd546582954d49cb0bceda1f2dd3
SHA512cf78d5c59b961b741663c7a99e277b3c41b276c3ee5db6cb3e019f7bdbdc9196d88bb8e2797270baaa31ee2b7401ccef2d7a192a9392292221e56d725c6f4938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599ea59303301b7f1392af2c081a06682
SHA1aaeaa191ca59594067fb5fbef35ad46289960c75
SHA256592b98a2e91f47bafe1715c40731c79dfc5d104fd8bf1e11783ba3cbf82ebbd1
SHA5122ca5608299869db4696ca2be4fc4cb7b5b6a8ee4a5965c72dadbd10637724fbe5529317972a64745a811f38d11ba203ecba506b069b48a3a6d7a5b7c4eaea983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aabd9dec47276f57884ae6b5be6bd0d4
SHA1beb33e37c3cab956d192bcbf28ac34b73919a1a1
SHA256b33cc7bf53a0d6fb3a42fdf54e23b91a1a5b7947232af238b44578cd1775e325
SHA512fee3e2d01a8db02321b19e835be782291a64886600f48e0c116a9aa0131dec3dbad9e5cd2d562ad0f9b94250291b4ff0552793573c07686cea02a8696ab5bfbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5522d7707e76a9c974132ab25785233ac
SHA121a69f8ff52017892fdd1a6b778e7e0f5638c5d8
SHA256bad9ff473b452b201cb203ec40b685f842c14e86b8ca8a0bb639cf9bd348a818
SHA512e2e9801f80df719790527f78b4c2e53d3b660d8434d2d9a51755ec52bd3dbafc301638a1e3f3e5ee742185b6489d1538db30b3fbf1c1b67f7a64306053d8f61c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530c0c1d1669d6915efd477d8b69d817b
SHA103eb72b980261aa2d35ae4578b4cedcb87bf9062
SHA256d68decb0c18cfdc4998ef7481ef7860f5e3de6e1fc80c6b6536a4081f010451a
SHA512596129141ea85d2dc302430bbadd744d8345f66f97ce0693128fd38cbedc37792bb7c001c0498b682194eca7311ca9af231ae91b754200162aa7dac6819b143c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c835d2eef7148b0a3596fb01dc94c356
SHA17bb8b2cf5335be376a46e267a3c2f21d2f72b72a
SHA2562a2f69f369c54b5fd26fb549b70fe5ff3500f7302aaaee2417b6a78187255dcc
SHA51203905747698fcdb6b1b6b30573d45c5e4f8443cfa58218689e299b64dc82b29fc5e188831e7d1cf373d61b2133c81aafa42304dad877c87eec9d71eb68321295
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a294da691b4068d0bd870a7c848dd44
SHA1bdaa998662c08e439cc10bb6bb52ebf365f4517e
SHA25684cfe8280c6a1e5ea7b4e8729d00d67aee22234fffbedfd97cf905413c9c6db5
SHA5124be0eff9e90d53c1a0beffa04bf5c1a3a4cdcb8e36a050962de526b84df6ddd7812cd40c035a864ee2fd3e250142ea806157e2570d16c6643295b84df7d5c785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b7e6abc10b1c9450cb5b0606c4f90c0
SHA1c28db713eb2d8bdb66255b36ed3762d83299cbb2
SHA2566368bf96b521c8ebe51c4b60cfbb5f4b79bf631db632337cc2b1c1e52bbb997c
SHA5127503e8a3828891dfd77b2b8cb7fcf7af47106b4b3345dc555e37114553e6cf1875ab8049bdb1f0d558b4d4a5f02f33d5cb1e0c46a97811a8b82b76acff787373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d597362cbb55001310e3537b9c6c2fbb
SHA1daae8dddaf2c59ae7bf59af8d9c18eff52c5d2cb
SHA256bb8a5ec473671a2b8783d54a7f28e4c5ce7024361216029140ad6fa9501cd476
SHA51218704cf5236a0c29096b0d951898ac160e4ac838476e8952ad9358f707b6dc0bafcf243f9ef00d8cae603290baac4d9210a32b028b44db0ce657ab66d440ff2e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a